Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
Analysis ID:1446066
MD5:5f0a83b1939cd3149ed5eba4ab88275b
SHA1:8e465479824d6bf63860b48573bc92faa18c9281
SHA256:d96bb6b110631c3a06afe836cb4f78d158c276ff0e1eea23a5cac39fec0e0e43
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe (PID: 7864 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe" MD5: 5F0A83B1939CD3149ED5EBA4AB88275B)
    • RegSvcs.exe (PID: 7916 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.gruporequena.com", "Username": "informes@gruporequena.com", "Password": "flandealmendra"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.2664985361.0000000000392000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.2664985361.0000000000392000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.2665862812.0000000002681000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000002.00000002.2665862812.0000000002681000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.390000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegSvcs.exe.390000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                2.2.RegSvcs.exe.390000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x33559:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x335cb:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x33655:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x336e7:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x33751:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x337c3:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x33859:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x338e9:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 198.59.144.129, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7916, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49705
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeAvira: detected
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.gruporequena.com", "Username": "informes@gruporequena.com", "Password": "flandealmendra"}
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeReversingLabs: Detection: 39%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.8:49704 version: TLS 1.2
                    Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000003.1413109739.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000003.1411166593.0000000003E90000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000003.1413109739.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000003.1411166593.0000000003E90000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_007A4696
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AC93C FindFirstFileW,FindClose,0_2_007AC93C
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_007AC9C7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007AF200
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007AF35D
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007AF65E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007A3A2B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007A3D4E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007ABF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007ABF27
                    Source: global trafficTCP traffic: 192.168.2.8:49705 -> 198.59.144.129:587
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewASN Name: HYPEENT-SJUS HYPEENT-SJUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.8:49705 -> 198.59.144.129:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007B25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007B25E2
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.gruporequena.com
                    Source: RegSvcs.exe, 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.gruporequena.com
                    Source: RegSvcs.exe, 00000002.00000002.2667882783.00000000058D8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665356221.0000000000A95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                    Source: RegSvcs.exe, 00000002.00000002.2667882783.00000000058D8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665356221.0000000000A95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                    Source: RegSvcs.exe, 00000002.00000002.2665862812.0000000002631000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegSvcs.exe, 00000002.00000002.2667882783.0000000005913000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.micrmscorlib.resources09-04-02.crt0
                    Source: RegSvcs.exe, 00000002.00000002.2667882783.00000000058D8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665356221.0000000000A95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: RegSvcs.exe, 00000002.00000002.2667882783.00000000058D8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665356221.0000000000A95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664985361.0000000000392000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665862812.0000000002631000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664985361.0000000000392000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: RegSvcs.exe, 00000002.00000002.2665862812.0000000002631000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: RegSvcs.exe, 00000002.00000002.2665862812.0000000002631000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.8:49704 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, gmBpn1ecBmQ.cs.Net Code: Av9MBXxQhO7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007B425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007B425A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007B4458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_007B4458
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007B425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007B425A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A0219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_007A0219
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007CCDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_007CCDAC

                    System Summary

                    barindex
                    Source: 2.2.RegSvcs.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: This is a third-party compiled AutoIt script.0_2_00743B4C
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000000.1402048953.00000000007F5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_19e208bd-f
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000000.1402048953.00000000007F5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_3fbf03d6-1
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_5b17518d-0
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_11760158-9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A4021: CreateFileW,DeviceIoControl,CloseHandle,0_2_007A4021
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00798858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00798858
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007A545F
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0074E8000_2_0074E800
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0076DBB50_2_0076DBB5
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0074E0600_2_0074E060
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007C804A0_2_007C804A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007541400_2_00754140
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007624050_2_00762405
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007765220_2_00776522
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0077267E0_2_0077267E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007C06650_2_007C0665
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007568430_2_00756843
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0076283A0_2_0076283A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007789DF0_2_007789DF
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00758A0E0_2_00758A0E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007C0AE20_2_007C0AE2
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00776A940_2_00776A94
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A8B130_2_007A8B13
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0079EB070_2_0079EB07
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0076CD610_2_0076CD61
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007770060_2_00777006
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0075710E0_2_0075710E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007531900_2_00753190
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007412870_2_00741287
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007633C70_2_007633C7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0076F4190_2_0076F419
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007616C40_2_007616C4
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007556800_2_00755680
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007678D30_2_007678D3
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007558C00_2_007558C0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00761BB80_2_00761BB8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00779D050_2_00779D05
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0074FE400_2_0074FE40
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0076BFE60_2_0076BFE6
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00761FD00_2_00761FD0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_01FF36B00_2_01FF36B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_024FAA222_2_024FAA22
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_024F4AA02_2_024F4AA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_024F3E882_2_024F3E88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_024FDCBD2_2_024FDCBD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_024F41D02_2_024F41D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_024FDFA82_2_024FDFA8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05EB46982_2_05EB4698
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05EB36502_2_05EB3650
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05EB5E282_2_05EB5E28
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05EBE1D52_2_05EBE1D5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05EB11082_2_05EB1108
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05EB92E02_2_05EB92E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05EBC4502_2_05EBC450
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05EB57482_2_05EB5748
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_024FE44F2_2_024FE44F
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: String function: 00768B40 appears 42 times
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: String function: 00747F41 appears 35 times
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: String function: 00760D27 appears 70 times
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000003.1417036711.0000000003FFD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000003.1411050485.0000000003E13000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename99086655-5f14-43d1-9cbf-0c47aeef50d3.exe4 vs SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 2.2.RegSvcs.exe.390000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, roEs93G.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, roEs93G.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, JQn0Aia1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, JQn0Aia1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, YsrmZ97b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, YsrmZ97b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, YsrmZ97b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, YsrmZ97b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/2
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AA2D5 GetLastError,FormatMessageW,0_2_007AA2D5
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00798713 AdjustTokenPrivileges,CloseHandle,0_2_00798713
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00798CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00798CC3
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AB59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_007AB59E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007BF121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_007BF121
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AC602 CoInitialize,CoCreateInstance,CoUninitialize,0_2_007AC602
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00744FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00744FE9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeFile created: C:\Users\user\AppData\Local\Temp\aut4191.tmpJump to behavior
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeReversingLabs: Detection: 39%
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic file information: File size 1052672 > 1048576
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000003.1413109739.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000003.1411166593.0000000003E90000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000003.1413109739.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000003.1411166593.0000000003E90000.00000004.00001000.00020000.00000000.sdmp
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007BC304 LoadLibraryA,GetProcAddress,0_2_007BC304
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0074C590 push eax; retn 0074h0_2_0074C599
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00768B85 push ecx; ret 0_2_00768B98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_024F0C77 push edi; retf 2_2_024F0C7A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00744A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00744A35
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007C55FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_007C55FD
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007633C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_007633C7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1197Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3485Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-99260
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeAPI coverage: 4.6 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_007A4696
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AC93C FindFirstFileW,FindClose,0_2_007AC93C
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_007AC9C7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007AF200
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_007AF35D
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007AF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007AF65E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007A3A2B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007A3D4E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007ABF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_007ABF27
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00744AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00744AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99782Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99657Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99536Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99372Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99250Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99141Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99032Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98907Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98782Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98657Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98532Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98407Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98282Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98172Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98047Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97594Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97357Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RegSvcs.exe, 00000002.00000002.2667882783.00000000058D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeAPI call chain: ExitProcess graph end nodegraph_0-97947
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeAPI call chain: ExitProcess graph end nodegraph_0-98019
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007B41FD BlockInput,0_2_007B41FD
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00743B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00743B4C
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00775CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00775CCC
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007BC304 LoadLibraryA,GetProcAddress,0_2_007BC304
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_01FF35A0 mov eax, dword ptr fs:[00000030h]0_2_01FF35A0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_01FF3540 mov eax, dword ptr fs:[00000030h]0_2_01FF3540
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_01FF1ED0 mov eax, dword ptr fs:[00000030h]0_2_01FF1ED0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007981F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007981F7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0076A364 SetUnhandledExceptionFilter,0_2_0076A364
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0076A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0076A395
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 4AD008Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00798C93 LogonUserW,0_2_00798C93
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00743B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00743B4C
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00744A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00744A35
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A4EF5 mouse_event,0_2_007A4EF5
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007981F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007981F7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007A4C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_007A4C03
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0076886B cpuid 0_2_0076886B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007750D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_007750D7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00782230 GetUserNameW,0_2_00782230
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_0077418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0077418A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_00744AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00744AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.390000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2664985361.0000000000392000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2665862812.0000000002681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe PID: 7864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7916, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeBinary or memory string: WIN_81
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeBinary or memory string: WIN_XP
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeBinary or memory string: WIN_XPe
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeBinary or memory string: WIN_VISTA
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeBinary or memory string: WIN_7
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeBinary or memory string: WIN_8
                    Source: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.390000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.2664985361.0000000000392000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2665862812.0000000002681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe PID: 7864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7916, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.390000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe.20a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2664985361.0000000000392000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2665862812.0000000002681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe PID: 7864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7916, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007B6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_007B6596
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exeCode function: 0_2_007B6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_007B6A5A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS38
                    System Information Discovery
                    Distributed Component Object Model121
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets141
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials121
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe39%ReversingLabs
                    SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe100%AviraTR/AD.ShellcodeCrypter.wffqx
                    SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    http://r3.o.lencr.org00%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://x1.c.lencr.org/00%URL Reputationsafe
                    http://x1.i.lencr.org/00%URL Reputationsafe
                    http://r3.i.lencr.org/00%URL Reputationsafe
                    http://www.micrmscorlib.resources09-04-02.crt00%Avira URL Cloudsafe
                    http://mail.gruporequena.com0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    172.67.74.152
                    truefalse
                      unknown
                      mail.gruporequena.com
                      198.59.144.129
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://r3.o.lencr.org0RegSvcs.exe, 00000002.00000002.2667882783.00000000058D8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665356221.0000000000A95000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.orgSecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665862812.0000000002631000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664985361.0000000000392000.00000040.80000000.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.micrmscorlib.resources09-04-02.crt0RegSvcs.exe, 00000002.00000002.2667882783.0000000005913000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://account.dyn.com/SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe, 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2664985361.0000000000392000.00000040.80000000.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.org/tRegSvcs.exe, 00000002.00000002.2665862812.0000000002631000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2665862812.0000000002631000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://x1.c.lencr.org/0RegSvcs.exe, 00000002.00000002.2667882783.00000000058D8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665356221.0000000000A95000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://x1.i.lencr.org/0RegSvcs.exe, 00000002.00000002.2667882783.00000000058D8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665356221.0000000000A95000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://mail.gruporequena.comRegSvcs.exe, 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://r3.i.lencr.org/0RegSvcs.exe, 00000002.00000002.2667882783.00000000058D8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2665356221.0000000000A95000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        198.59.144.129
                        mail.gruporequena.comUnited States
                        13332HYPEENT-SJUStrue
                        172.67.74.152
                        api.ipify.orgUnited States
                        13335CLOUDFLARENETUSfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1446066
                        Start date and time:2024-05-22 22:07:41 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 5s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:7
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@3/4@2/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 61
                        • Number of non-executed functions: 267
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
                        TimeTypeDescription
                        16:08:37API Interceptor23x Sleep call for process: RegSvcs.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        198.59.144.129SecuriteInfo.com.Trojan.AutoIt.1383.12149.18521.exeGet hashmaliciousAgentTeslaBrowse
                          172.67.74.152K8mzlntJVN.msiGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          stub.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          stub.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                          • api.ipify.org/?format=json
                          Sky-Beta.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/?format=json
                          Sky-Beta.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/?format=json
                          Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                          • api.ipify.org/?format=json
                          Sky-Beta.exeGet hashmaliciousStealitBrowse
                          • api.ipify.org/?format=json
                          SongOfVikings.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/?format=json
                          SongOfVikings.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/?format=json
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          api.ipify.orgFreigabeerkl#U00e4rung..exeGet hashmaliciousGuLoaderBrowse
                          • 104.26.13.205
                          hesaphareketi_1.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          hesaphareketi-05222025.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          Hesaphareketi-01.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.13.205
                          Hesap hesaphareketi-01.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.13.205
                          jyMNBAzJly.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          SOLICITUD DE PRESUPUESTO.exeGet hashmaliciousGuLoaderBrowse
                          • 104.26.12.205
                          BBVA__Aviso_de_Pago_pdf.pif.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.12.205
                          Aviso legal.exeGet hashmaliciousGuLoaderBrowse
                          • 104.26.12.205
                          Inventory_list.img.exeGet hashmaliciousGuLoaderBrowse
                          • 104.26.13.205
                          mail.gruporequena.comSecuriteInfo.com.Trojan.AutoIt.1383.12149.18521.exeGet hashmaliciousAgentTeslaBrowse
                          • 198.59.144.129
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          HYPEENT-SJUSSecuriteInfo.com.Trojan.AutoIt.1383.12149.18521.exeGet hashmaliciousAgentTeslaBrowse
                          • 198.59.144.129
                          xQwEu422am.elfGet hashmaliciousMiraiBrowse
                          • 207.66.48.4
                          UPGN1ElMxF.elfGet hashmaliciousMiraiBrowse
                          • 207.66.44.101
                          Cm1FNv3k5V.elfGet hashmaliciousMiraiBrowse
                          • 198.59.158.197
                          TYZYR0059i.elfGet hashmaliciousMiraiBrowse
                          • 207.66.48.3
                          trFuo3bHdx.elfGet hashmaliciousMiraiBrowse
                          • 206.206.85.157
                          http://www.ecorfan.orgGet hashmaliciousUnknownBrowse
                          • 198.59.144.150
                          https://udinamo.edu.mx/auso/?9418572Get hashmaliciousUnknownBrowse
                          • 198.59.144.133
                          mirai.x86Get hashmaliciousMiraiBrowse
                          • 198.59.176.83
                          xfJ0Tqc3CA.elfGet hashmaliciousUnknownBrowse
                          • 206.206.85.187
                          CLOUDFLARENETUSFreigabeerkl#U00e4rung..exeGet hashmaliciousGuLoaderBrowse
                          • 104.26.13.205
                          hesaphareketi_1.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          hesaphareketi-05222025.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          Hesaphareketi-01.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.13.205
                          https://u32291210.ct.sendgrid.net/ls/click?upn=u001.zoYnZnzT1aNmxJyDpkt5-2F7ByDXhgHLoQINYxAMxqgpvOMLVzh2duB66JhsxmyNA-2B2oB29Sr-2BzUY3wsjUhL2w9w-3D-3DzLYR_E9PZ-2BNd-2BL-2FR-2FOsoqChC9LPbvFaV0s1njwxE0n9wyiNepBnXObnHyQf0Ox16EAtw0HITpr4QufWYHU-2FMF-2FYtG-2FUx1lneU2A8oshW8vQCDJT7V1aDwmGHrGPEUfNk-2BL7E29MeLQRurIdmGI6J2wW-2FHEHY-2FH2k1w8pcozxtLO-2FQcWd1Z75RHd6z6Rz-2FnYMpLiQR-2Ba6Xi9bSq62ph-2Fx4Wy5rEk14P2SsQkC1xAglbpMaIkGPriUiu1i-2B2SPtsxmQMUBDZ0yuyPlCYenGmrBDISDo28mqVRcU7H9gbpI-2BGBc7gVvsoFobGAujAwtvMDY6syXbecDgXgdAVZExexA5-2F-2BFj7hlD0KLoX1l18-2BMJWP6EQm4PLE1aaEf0CHd6Mv-2BtQe6ZVAV5UWiNWin1lJTOw7s646pCT7jQ-2BhEQUnqUx0NFHFw-2Bmufqblk5fJLT3I406XkF5yEDer67L0oXESfK4NfFP-2BSZQvG4M7Tdk7ilnyg4drSCxHDQjMQAiPuXIU-2F2jNL8okF8RQHSnGCCGSV-2FVhyiLxgTtwXulPsS2Pfu3VxcWTGee78ZvvJoPAMjUdELlc4orywF-2FtAFJFvQt1NfXJsHy53Ndf0bsLTzh5WDP36wbQGeqd29Fs7BRhhcsd7mwtzgDqbZIMmTLITIpAaSwSNsjJHx9DSMOeCo7pD2ZqTLCQ3vBDZPdARAZD3UIFbhBFKI-2FbBs-2FupWBBB7aPI45C-2BdGElT5AypObmE5PKEgXVuF3lxA5Y2t6mEIsVXGmQpPfKtAJaHYluOvTRB9DW7q9KOyI4Pcsi3FxeuuIe-2FTG0c9MAyO2HO1TSdYaqyoLpLsqtTsqyQMnFO0Yl8NPB6XwEOt9-2Bu9Rp-2F4LbHJTfJDyJ3Sh7-2FZwLkAx6u6SdyfnvRSGc93MbM37LnWS7aV-2F77ZN4aNVDIeDxxgTg34QEKNiFOrZiwODBLc0alaLuPjMMmsuwyWIiooz6VWDGfL0TJ-2FAMbeLtjov46V1xT-2Fg9WWXArp-2FAn7hYl6g1dGriic0McSexmGet hashmaliciousUnknownBrowse
                          • 172.67.72.144
                          Hesap hesaphareketi-01.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.13.205
                          jyMNBAzJly.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          INV 267365.docGet hashmaliciousUnknownBrowse
                          • 188.114.96.9
                          https://wowwowhawaiianlemonade.comGet hashmaliciousUnknownBrowse
                          • 104.22.0.204
                          SOLICITUD DE PRESUPUESTO.exeGet hashmaliciousGuLoaderBrowse
                          • 104.26.12.205
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          3b5074b1b5d032e5620f69f9f700ff0eFreigabeerkl#U00e4rung..exeGet hashmaliciousGuLoaderBrowse
                          • 172.67.74.152
                          hesaphareketi_1.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          hesaphareketi-05222025.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          Hesaphareketi-01.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          Hesap hesaphareketi-01.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          jyMNBAzJly.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          SOLICITUD DE PRESUPUESTO.exeGet hashmaliciousGuLoaderBrowse
                          • 172.67.74.152
                          Tender for Quote_MYQTRA031244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          Shipping document.vbsGet hashmaliciousGuLoader, RemcosBrowse
                          • 172.67.74.152
                          Receipt #761.vbsGet hashmaliciousUnknownBrowse
                          • 172.67.74.152
                          No context
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):160224
                          Entropy (8bit):7.949599425852553
                          Encrypted:false
                          SSDEEP:3072:zD16Xy6+Are9fQ0ejOVJNjOf8zGw8vgbo9CzB/51k:pxfeD1ysAzR51k
                          MD5:42384EAD4288ECE1F602F6770C7D763E
                          SHA1:1A086C9E54F73034F701E89AB678A280B5775D7F
                          SHA-256:018ED01FB683358C71F9D3A5DE797E143AF4A0CD3AD7DEFB9E0BAA934544BABC
                          SHA-512:91C6DBBAB7DF5B4FB54BE760176FD067EB5C10F730A6C49C6E5EC70ED2624940CA2B541D165F54820EAC4094C9C3676EE5A2439FB2FC6B997B6A76FD27FA9410
                          Malicious:false
                          Reputation:low
                          Preview:EA06......5...O.M.T}n..V.S&s.-b.E...*Eb.I.U@.J@..R..j.......q...+............$3k..i-..2K..=...w.,..'......9..X..4..].T. ...E..k.6a8.]!.0.|.wUY.J.I.V..*.V.8.t.o.Y.P....h...M.Vp...0.M.$sB.....7..Wb.3.p+.....V..k5...... .....Z......*p.h.G...(. .x...f.R*....\.k...l...\.:z..J....td).9..._....{..C!..+.Y....V..@...Y.t.!.9...:.K.Z."..t....D..t..+..Eb.............W)u.....M..j.L..N(......w...........n...w7d.O.4..A...{1ZDN....8.k......q..,...V.3......y....D.Ph...w..H.r...".W%..WS......He..C.x...yz....dk...Do;..3Y.D.|>..O.Mev.L.A%....)L..3.T55@.....~.BW0......].X~=}.z.D.F...VVl..H.2...YR...........t.`..H..G.:...A..... .t........S.%...n..y....V>.&...r}}8.......$..1..y....1..Mc....-?.C..]....E..H.....G.....4.Q..Z\#I..ZkUJm~.4..(...3Y....v........_...7"..@^p..t.$M.2g...8.>......;Z..N......*..qQ.W.Yd..1..e.It......v...k?....uF.S......R..j.:..H.Q.U}].AL..P*E..$.P....".U.K....z.....S.d.#.R(4..V.H.T.zJ.v.O.Q,.z.VQ3.."U...|.@Z-U...CU...(.>.R..j..l..S.Rj{...
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):9982
                          Entropy (8bit):7.606599774431878
                          Encrypted:false
                          SSDEEP:192:eyaFcTokLqcFEelaNVvfNa5u0WK30vBH6ArHKcrEMLrQpck49HPJ38pCw:AFxkLqcCela/KTWK30vBaAr7QMXQd4dq
                          MD5:81351ED284F5B352AD534EE5B7003F87
                          SHA1:6A13F76F44AEC7899CF3699FC920620013755CA0
                          SHA-256:6F7E9701251E972A731A8F77F5A97A16B256C95E3EA4748A7625D27C5554B849
                          SHA-512:91B75D1980D535C90E2B48F563B4F6D207BF9E1FA6E918371434202D11739ECE977DECC363038354B52E3B9AF93E6E85219F0A8105BDD7E99DEDCADCD6CB68FA
                          Malicious:false
                          Reputation:low
                          Preview:EA06..t4.M(...aD..fT)..D.Mh.z,.gA....5.......B.Mh..%.mF.Mf....qb.....-..c.L...$.m5...k..c0.M....k8.X.3i...l..%.o2....A8.6,.........3k....e.N&s0.oNf.)...k.K$.eb....5..f.........6.0.o.p....l39....V0...S..$.if...6....f.I...@.....i8........X@.4.1..........$.P...0z.5..$}3Y.....=5..`d....!d..V...7f.[$..8...|.I..W.d...|vI..W.d...|vK..W.d...|vK(.W.e...|vY..W,.O...k.`..X@..9..^.8..F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn.
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
                          File Type:ASCII text, with very long lines (29748), with no line terminators
                          Category:dropped
                          Size (bytes):29748
                          Entropy (8bit):3.5544843643201274
                          Encrypted:false
                          SSDEEP:768:ViTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbYE+I563b4vfF3if6gym:ViTZ+2QoioGRk6ZklputwjpjBkCiw2R2
                          MD5:867CBF121504A49403BA751EBC987BCB
                          SHA1:FEE5D0853EF63C59DBF21A8E93C51FCB297CD7E0
                          SHA-256:811021D4AB74F655A7683EDDBD5C83614AF363D15EA092AE824A1014AB5E62EB
                          SHA-512:21662C2EEEFFE47B59CA39E05EE7460122C405F2D7F65C31C1D2D907509C74D655BF33956AB860365020C54F838C9B6A74840E445BC226D23CBC5FA2B13C673F
                          Malicious:false
                          Reputation:low
                          Preview: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
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):240128
                          Entropy (8bit):6.777080386574941
                          Encrypted:false
                          SSDEEP:6144:EI22l03x9tC8cK8Vb/+lgfAHJS1j0Cz+UE37440:EI22l8PtsT+cApHINe4V
                          MD5:DBF2489A3255A104538AB6F5E60BDF47
                          SHA1:98CC59B9466DBD54A483DADDB19972DA6951C66B
                          SHA-256:A36391C61DED7F8BB8C469F24152F9966702CDD1D8F637BB1570E4B5B62B1875
                          SHA-512:7C667F7CAA716E51C7D54A320BC0E29B50F7DDC6263A9B189E74782C214F2DFB40BDFE6C3CD9AEFBF467A938F308D822129FFCCBA001AC685261CCE45A69587D
                          Malicious:false
                          Reputation:low
                          Preview:...ZV3SOL7ZG..UV.L38EXHE.ZFBHXPIZU3SOH7ZGRSUV0L38EXHECZFBHXP.ZU3]P.9Z.[.t.1....0!6c*4-/*1$z6R=!'Cz%7s'#^lZVe...c7)&-v]DPq3SOH7ZG..UV|M08.t.#CZFBHXPI.U1RDI<ZG.PUV8L38EXH..YFBhXPI.V3SO.7ZgRSUT0L78EXHECZBBHXPIZU3SKH7XGRSUV0N3x.XHUCZVBHXPYZU#SOH7ZGBSUV0L38EXHE..EB.XPIZ.0S.M7ZGRSUV0L38EXHECZFB.[PEZU3SOH7ZGRSUV0L38EXHECZFBHXPIZU3SOH7ZGRSUV0L38EXHECZfBHPPIZU3SOH7ZGZsUVxL38EXHECZFBf,51.U3S..4ZGrSUV.O38GXHECZFBHXPIZU3sOHWt5!!6V0Lu=EXH.@ZFDHXP.YU3SOH7ZGRSUV0.38.v: /5%BHTPIZU.POH5ZGR.VV0L38EXHECZFB.XP.ZU3SOH7ZGRSUV0L3..[HECZF.HXPKZP3..J7.vSSVV0L28E^HECZFBHXPIZU3SOH7ZGRSUV0L38EXHECZFBHXPIZU3SOH7ZGO.....{..%vO!].d.?.J.. ..1..H.F.-$..s.U....e=^..Z.<c...S...#.D6AD....~"C)^!.".\..*....hwD.x.C6.?...<z.>O~......y....YD.k..,.. 5+l)( %?{`2))E3.P.TV0L3.......+0..dYZ-g]0a...aDH.....6ECZ"BHX"IZURSOHpZGR<UV0"38E&HEC$FBH.PIZ.3SO.7ZGwSUV]L38aXHE=ZFB.%_F...:<..ZGRSUc....(.....q..f8.+h1w..#....5..7-.?.....F."..$.$N...URSR5N4<FTuK....iZTM_W4WLD.T....w.j..|..2....".5ZU3SOH.ZG.SUV..3.EXH.C.F..XPI.3.O.7...S
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.959647072960642
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
                          File size:1'052'672 bytes
                          MD5:5f0a83b1939cd3149ed5eba4ab88275b
                          SHA1:8e465479824d6bf63860b48573bc92faa18c9281
                          SHA256:d96bb6b110631c3a06afe836cb4f78d158c276ff0e1eea23a5cac39fec0e0e43
                          SHA512:a739fc54a5217a823d72c14c37c0e5842d2c84f94ceeb264d023486b4d24843bf5e22a3236833e935bb04fe751ea7ec10e4fa2234edd6f7a309d3447584cdcea
                          SSDEEP:24576:6AHnh+eWsN3skA4RV1Hom2KXMmHac4XSQi+vV3yPV5:Nh+ZkldoPK8Yac4iQiuV3o
                          TLSH:EE25AD0273D2C036FFAB92739B6AB64556BC79250133852F13981DB9BD701B2273E663
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                          Icon Hash:aaf3e3e3938382a0
                          Entrypoint:0x42800a
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                          Time Stamp:0x664DC1B0 [Wed May 22 09:58:08 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:1
                          File Version Major:5
                          File Version Minor:1
                          Subsystem Version Major:5
                          Subsystem Version Minor:1
                          Import Hash:afcdf79be1557326c854b6e20cb900a7
                          Instruction
                          call 00007F6CE101FBDDh
                          jmp 00007F6CE1012994h
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          int3
                          push edi
                          push esi
                          mov esi, dword ptr [esp+10h]
                          mov ecx, dword ptr [esp+14h]
                          mov edi, dword ptr [esp+0Ch]
                          mov eax, ecx
                          mov edx, ecx
                          add eax, esi
                          cmp edi, esi
                          jbe 00007F6CE1012B1Ah
                          cmp edi, eax
                          jc 00007F6CE1012E7Eh
                          bt dword ptr [004C41FCh], 01h
                          jnc 00007F6CE1012B19h
                          rep movsb
                          jmp 00007F6CE1012E2Ch
                          cmp ecx, 00000080h
                          jc 00007F6CE1012CE4h
                          mov eax, edi
                          xor eax, esi
                          test eax, 0000000Fh
                          jne 00007F6CE1012B20h
                          bt dword ptr [004BF324h], 01h
                          jc 00007F6CE1012FF0h
                          bt dword ptr [004C41FCh], 00000000h
                          jnc 00007F6CE1012CBDh
                          test edi, 00000003h
                          jne 00007F6CE1012CCEh
                          test esi, 00000003h
                          jne 00007F6CE1012CADh
                          bt edi, 02h
                          jnc 00007F6CE1012B1Fh
                          mov eax, dword ptr [esi]
                          sub ecx, 04h
                          lea esi, dword ptr [esi+04h]
                          mov dword ptr [edi], eax
                          lea edi, dword ptr [edi+04h]
                          bt edi, 03h
                          jnc 00007F6CE1012B23h
                          movq xmm1, qword ptr [esi]
                          sub ecx, 08h
                          lea esi, dword ptr [esi+08h]
                          movq qword ptr [edi], xmm1
                          lea edi, dword ptr [edi+08h]
                          test esi, 00000007h
                          je 00007F6CE1012B75h
                          bt esi, 03h
                          Programming Language:
                          • [ASM] VS2013 build 21005
                          • [ C ] VS2013 build 21005
                          • [C++] VS2013 build 21005
                          • [ C ] VS2008 SP1 build 30729
                          • [IMP] VS2008 SP1 build 30729
                          • [ASM] VS2013 UPD5 build 40629
                          • [RES] VS2013 build 21005
                          • [LNK] VS2013 UPD5 build 40629
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x36890.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xff0000x7134.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0xc80000x368900x36a00aaf7a7c04edd02c3ad6043b580fea384False0.8788704948512586data7.773921611048723IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xff0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                          RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                          RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                          RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                          RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                          RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                          RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                          RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                          RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                          RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                          RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                          RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                          RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                          RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                          RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                          RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                          RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                          RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                          RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                          RT_RCDATA0xd07b80x2db26data1.0003526130766025
                          RT_GROUP_ICON0xfe2e00x76dataEnglishGreat Britain0.6610169491525424
                          RT_GROUP_ICON0xfe3580x14dataEnglishGreat Britain1.25
                          RT_GROUP_ICON0xfe36c0x14dataEnglishGreat Britain1.15
                          RT_GROUP_ICON0xfe3800x14dataEnglishGreat Britain1.25
                          RT_VERSION0xfe3940x10cdataEnglishGreat Britain0.5932835820895522
                          RT_MANIFEST0xfe4a00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                          DLLImport
                          WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                          VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                          WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                          PSAPI.DLLGetProcessMemoryInfo
                          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                          USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                          UxTheme.dllIsThemeActive
                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                          USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                          GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                          COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                          OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                          Language of compilation systemCountry where language is spokenMap
                          EnglishGreat Britain
                          TimestampSource PortDest PortSource IPDest IP
                          May 22, 2024 22:08:37.787661076 CEST49704443192.168.2.8172.67.74.152
                          May 22, 2024 22:08:37.787704945 CEST44349704172.67.74.152192.168.2.8
                          May 22, 2024 22:08:37.787785053 CEST49704443192.168.2.8172.67.74.152
                          May 22, 2024 22:08:37.796401024 CEST49704443192.168.2.8172.67.74.152
                          May 22, 2024 22:08:37.796425104 CEST44349704172.67.74.152192.168.2.8
                          May 22, 2024 22:08:38.289381027 CEST44349704172.67.74.152192.168.2.8
                          May 22, 2024 22:08:38.289444923 CEST49704443192.168.2.8172.67.74.152
                          May 22, 2024 22:08:38.293586016 CEST49704443192.168.2.8172.67.74.152
                          May 22, 2024 22:08:38.293592930 CEST44349704172.67.74.152192.168.2.8
                          May 22, 2024 22:08:38.294019938 CEST44349704172.67.74.152192.168.2.8
                          May 22, 2024 22:08:38.343740940 CEST49704443192.168.2.8172.67.74.152
                          May 22, 2024 22:08:38.349426031 CEST49704443192.168.2.8172.67.74.152
                          May 22, 2024 22:08:38.394495010 CEST44349704172.67.74.152192.168.2.8
                          May 22, 2024 22:08:38.538770914 CEST44349704172.67.74.152192.168.2.8
                          May 22, 2024 22:08:38.538918972 CEST44349704172.67.74.152192.168.2.8
                          May 22, 2024 22:08:38.538975000 CEST49704443192.168.2.8172.67.74.152
                          May 22, 2024 22:08:38.553050041 CEST49704443192.168.2.8172.67.74.152
                          May 22, 2024 22:08:39.197010040 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:39.207181931 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:39.207324028 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:40.005561113 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.009618998 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.009742975 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:40.013556004 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:40.073708057 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.175468922 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.175724983 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:40.180809975 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.307857037 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.308468103 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:40.334733009 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.452244997 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.453035116 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.453144073 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:40.457998037 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.492856979 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:40.498805046 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.631999016 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.634913921 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:40.658153057 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.803658009 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.825949907 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:40.840193033 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.989655018 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:40.990653992 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:41.008479118 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.146300077 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.146759033 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:41.179090977 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.300988913 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.301309109 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:41.308245897 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.448385000 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.448780060 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:41.514797926 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.582125902 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.582829952 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:41.582914114 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:41.582914114 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:41.582914114 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:08:41.591875076 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.619393110 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.619410038 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.619420052 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.834161997 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:08:41.875037909 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:10:19.125442028 CEST49705587192.168.2.8198.59.144.129
                          May 22, 2024 22:10:19.130579948 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:10:19.284646988 CEST58749705198.59.144.129192.168.2.8
                          May 22, 2024 22:10:19.285394907 CEST49705587192.168.2.8198.59.144.129
                          TimestampSource PortDest PortSource IPDest IP
                          May 22, 2024 22:08:37.754180908 CEST4927253192.168.2.81.1.1.1
                          May 22, 2024 22:08:37.782368898 CEST53492721.1.1.1192.168.2.8
                          May 22, 2024 22:08:39.101372004 CEST6084253192.168.2.81.1.1.1
                          May 22, 2024 22:08:39.196134090 CEST53608421.1.1.1192.168.2.8
                          May 22, 2024 22:08:58.047509909 CEST53616451.1.1.1192.168.2.8
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          May 22, 2024 22:08:37.754180908 CEST192.168.2.81.1.1.10xf167Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                          May 22, 2024 22:08:39.101372004 CEST192.168.2.81.1.1.10xcb87Standard query (0)mail.gruporequena.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          May 22, 2024 22:08:37.782368898 CEST1.1.1.1192.168.2.80xf167No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                          May 22, 2024 22:08:37.782368898 CEST1.1.1.1192.168.2.80xf167No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                          May 22, 2024 22:08:37.782368898 CEST1.1.1.1192.168.2.80xf167No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                          May 22, 2024 22:08:39.196134090 CEST1.1.1.1192.168.2.80xcb87No error (0)mail.gruporequena.com198.59.144.129A (IP address)IN (0x0001)false
                          • api.ipify.org
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.849704172.67.74.1524437916C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                          TimestampBytes transferredDirectionData
                          2024-05-22 20:08:38 UTC155OUTGET / HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                          Host: api.ipify.org
                          Connection: Keep-Alive
                          2024-05-22 20:08:38 UTC211INHTTP/1.1 200 OK
                          Date: Wed, 22 May 2024 20:08:38 GMT
                          Content-Type: text/plain
                          Content-Length: 12
                          Connection: close
                          Vary: Origin
                          CF-Cache-Status: DYNAMIC
                          Server: cloudflare
                          CF-RAY: 887f707819b48c7e-EWR
                          2024-05-22 20:08:38 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
                          Data Ascii: 8.46.123.175


                          TimestampSource PortDest PortSource IPDest IPCommands
                          May 22, 2024 22:08:40.005561113 CEST58749705198.59.144.129192.168.2.8220-svgp316.serverneubox.com.mx ESMTP Exim 4.96.2 #2 Wed, 22 May 2024 14:08:39 -0600
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          May 22, 2024 22:08:40.009618998 CEST58749705198.59.144.129192.168.2.8220-svgp316.serverneubox.com.mx ESMTP Exim 4.96.2 #2 Wed, 22 May 2024 14:08:39 -0600
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          May 22, 2024 22:08:40.013556004 CEST49705587192.168.2.8198.59.144.129EHLO 035347
                          May 22, 2024 22:08:40.175468922 CEST58749705198.59.144.129192.168.2.8250-svgp316.serverneubox.com.mx Hello 035347 [8.46.123.175]
                          250-SIZE 52428800
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          May 22, 2024 22:08:40.175724983 CEST49705587192.168.2.8198.59.144.129STARTTLS
                          May 22, 2024 22:08:40.307857037 CEST58749705198.59.144.129192.168.2.8220 TLS go ahead

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:16:08:34
                          Start date:22/05/2024
                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe"
                          Imagebase:0x740000
                          File size:1'052'672 bytes
                          MD5 hash:5F0A83B1939CD3149ED5EBA4AB88275B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1420714901.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          Reputation:low
                          Has exited:true

                          Target ID:2
                          Start time:16:08:35
                          Start date:22/05/2024
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe"
                          Imagebase:0x2c0000
                          File size:45'984 bytes
                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2665862812.00000000026A5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2664985361.0000000000392000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2664985361.0000000000392000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2665862812.0000000002681000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2665862812.0000000002681000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:high
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:4%
                            Dynamic/Decrypted Code Coverage:1.5%
                            Signature Coverage:6%
                            Total number of Nodes:2000
                            Total number of Limit Nodes:165
                            execution_graph 97891 741055 97896 742649 97891->97896 97906 7477c7 97896->97906 97900 742754 97901 74105a 97900->97901 97914 743416 59 API calls 2 library calls 97900->97914 97903 762f80 97901->97903 97960 762e84 97903->97960 97905 741064 97915 760ff6 97906->97915 97908 7477e8 97909 760ff6 Mailbox 59 API calls 97908->97909 97910 7426b7 97909->97910 97911 743582 97910->97911 97953 7435b0 97911->97953 97914->97900 97917 760ffe 97915->97917 97918 761018 97917->97918 97920 76101c std::exception::exception 97917->97920 97925 76594c 97917->97925 97942 7635e1 DecodePointer 97917->97942 97918->97908 97943 7687db RaiseException 97920->97943 97922 761046 97944 768711 58 API calls _free 97922->97944 97924 761058 97924->97908 97926 7659c7 97925->97926 97930 765958 97925->97930 97951 7635e1 DecodePointer 97926->97951 97928 7659cd 97952 768d68 58 API calls __getptd_noexit 97928->97952 97929 765963 97929->97930 97945 76a3ab 58 API calls 2 library calls 97929->97945 97946 76a408 58 API calls 7 library calls 97929->97946 97947 7632df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97929->97947 97930->97929 97933 76598b RtlAllocateHeap 97930->97933 97936 7659b3 97930->97936 97940 7659b1 97930->97940 97948 7635e1 DecodePointer 97930->97948 97933->97930 97934 7659bf 97933->97934 97934->97917 97949 768d68 58 API calls __getptd_noexit 97936->97949 97950 768d68 58 API calls __getptd_noexit 97940->97950 97942->97917 97943->97922 97944->97924 97945->97929 97946->97929 97948->97930 97949->97940 97950->97934 97951->97928 97952->97934 97954 7435bd 97953->97954 97955 7435a1 97953->97955 97954->97955 97956 7435c4 RegOpenKeyExW 97954->97956 97955->97900 97956->97955 97957 7435de RegQueryValueExW 97956->97957 97958 743614 RegCloseKey 97957->97958 97959 7435ff 97957->97959 97958->97955 97959->97958 97961 762e90 _doexit 97960->97961 97968 763457 97961->97968 97967 762eb7 _doexit 97967->97905 97985 769e4b 97968->97985 97970 762e99 97971 762ec8 DecodePointer DecodePointer 97970->97971 97972 762ea5 97971->97972 97973 762ef5 97971->97973 97982 762ec2 97972->97982 97973->97972 98031 7689e4 59 API calls 2 library calls 97973->98031 97975 762f58 EncodePointer EncodePointer 97975->97972 97976 762f07 97976->97975 97977 762f2c 97976->97977 98032 768aa4 61 API calls 2 library calls 97976->98032 97977->97972 97980 762f46 EncodePointer 97977->97980 98033 768aa4 61 API calls 2 library calls 97977->98033 97980->97975 97981 762f40 97981->97972 97981->97980 98034 763460 97982->98034 97986 769e6f EnterCriticalSection 97985->97986 97987 769e5c 97985->97987 97986->97970 97992 769ed3 97987->97992 97989 769e62 97989->97986 98016 7632f5 58 API calls 3 library calls 97989->98016 97993 769edf _doexit 97992->97993 97994 769f00 97993->97994 97995 769ee8 97993->97995 98004 769f21 _doexit 97994->98004 98020 768a5d 58 API calls __malloc_crt 97994->98020 98017 76a3ab 58 API calls 2 library calls 97995->98017 97997 769eed 98018 76a408 58 API calls 7 library calls 97997->98018 98000 769f15 98002 769f1c 98000->98002 98003 769f2b 98000->98003 98001 769ef4 98019 7632df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98001->98019 98021 768d68 58 API calls __getptd_noexit 98002->98021 98005 769e4b __lock 58 API calls 98003->98005 98004->97989 98008 769f32 98005->98008 98010 769f57 98008->98010 98011 769f3f 98008->98011 98023 762f95 98010->98023 98022 76a06b InitializeCriticalSectionAndSpinCount 98011->98022 98014 769f4b 98029 769f73 LeaveCriticalSection _doexit 98014->98029 98017->97997 98018->98001 98020->98000 98021->98004 98022->98014 98024 762f9e RtlFreeHeap 98023->98024 98028 762fc7 _free 98023->98028 98025 762fb3 98024->98025 98024->98028 98030 768d68 58 API calls __getptd_noexit 98025->98030 98027 762fb9 GetLastError 98027->98028 98028->98014 98029->98004 98030->98027 98031->97976 98032->97977 98033->97981 98037 769fb5 LeaveCriticalSection 98034->98037 98036 762ec7 98036->97967 98037->98036 98038 741016 98043 744ad2 98038->98043 98041 762f80 __cinit 67 API calls 98042 741025 98041->98042 98044 760ff6 Mailbox 59 API calls 98043->98044 98045 744ada 98044->98045 98046 74101b 98045->98046 98050 744a94 98045->98050 98046->98041 98051 744a9d 98050->98051 98053 744aaf 98050->98053 98052 762f80 __cinit 67 API calls 98051->98052 98052->98053 98054 744afe 98053->98054 98055 7477c7 59 API calls 98054->98055 98056 744b16 GetVersionExW 98055->98056 98078 747d2c 98056->98078 98058 744b59 98068 744b86 98058->98068 98091 747e8c 98058->98091 98060 744b7a 98095 747886 98060->98095 98062 744bf1 GetCurrentProcess IsWow64Process 98063 744c0a 98062->98063 98065 744c20 98063->98065 98066 744c89 GetSystemInfo 98063->98066 98064 77dc8d 98087 744c95 98065->98087 98067 744c56 98066->98067 98067->98046 98068->98062 98068->98064 98071 744c32 98074 744c95 2 API calls 98071->98074 98072 744c7d GetSystemInfo 98073 744c47 98072->98073 98073->98067 98075 744c4d FreeLibrary 98073->98075 98076 744c3a GetNativeSystemInfo 98074->98076 98075->98067 98076->98073 98079 747da5 98078->98079 98080 747d38 __NMSG_WRITE 98078->98080 98081 747e8c 59 API calls 98079->98081 98082 747d73 98080->98082 98083 747d4e 98080->98083 98086 747d56 _memmove 98081->98086 98100 748189 98082->98100 98099 748087 59 API calls Mailbox 98083->98099 98086->98058 98088 744c2e 98087->98088 98089 744c9e LoadLibraryA 98087->98089 98088->98071 98088->98072 98089->98088 98090 744caf GetProcAddress 98089->98090 98090->98088 98092 747ea3 _memmove 98091->98092 98093 747e9a 98091->98093 98092->98060 98093->98092 98103 747faf 98093->98103 98096 747894 98095->98096 98097 747e8c 59 API calls 98096->98097 98098 7478a4 98097->98098 98098->98068 98099->98086 98101 760ff6 Mailbox 59 API calls 98100->98101 98102 748193 98101->98102 98102->98086 98104 747fc2 98103->98104 98106 747fbf _memmove 98103->98106 98105 760ff6 Mailbox 59 API calls 98104->98105 98105->98106 98106->98092 98107 1ff29bb 98108 1ff29c0 98107->98108 98116 1ff0000 98108->98116 98110 1ff29cc 98111 1ff29ea 98110->98111 98112 1ff2a80 98110->98112 98119 1ff2690 98111->98119 98132 1ff3330 9 API calls 98112->98132 98115 1ff2a67 98133 1ff3540 GetPEB 98116->98133 98118 1ff068b 98118->98110 98120 1ff0000 GetPEB 98119->98120 98123 1ff272f 98120->98123 98122 1ff2760 CreateFileW 98122->98123 98127 1ff276d 98122->98127 98124 1ff2789 VirtualAlloc 98123->98124 98123->98127 98130 1ff2890 FindCloseChangeNotification 98123->98130 98131 1ff28a0 VirtualFree 98123->98131 98135 1ff35a0 GetPEB 98123->98135 98125 1ff27aa ReadFile 98124->98125 98124->98127 98126 1ff27c8 VirtualAlloc 98125->98126 98125->98127 98126->98123 98126->98127 98128 1ff297c VirtualFree 98127->98128 98129 1ff298a 98127->98129 98128->98129 98129->98115 98130->98123 98131->98123 98132->98115 98134 1ff356a 98133->98134 98134->98118 98136 1ff35ca 98135->98136 98136->98122 98137 767e93 98138 767e9f _doexit 98137->98138 98174 76a048 GetStartupInfoW 98138->98174 98140 767ea4 98176 768dbc GetProcessHeap 98140->98176 98142 767efc 98143 767f07 98142->98143 98259 767fe3 58 API calls 3 library calls 98142->98259 98177 769d26 98143->98177 98146 767f0d 98147 767f18 __RTC_Initialize 98146->98147 98260 767fe3 58 API calls 3 library calls 98146->98260 98198 76d812 98147->98198 98150 767f27 98151 767f33 GetCommandLineW 98150->98151 98261 767fe3 58 API calls 3 library calls 98150->98261 98217 775173 GetEnvironmentStringsW 98151->98217 98154 767f32 98154->98151 98157 767f4d 98158 767f58 98157->98158 98262 7632f5 58 API calls 3 library calls 98157->98262 98227 774fa8 98158->98227 98161 767f5e 98162 767f69 98161->98162 98263 7632f5 58 API calls 3 library calls 98161->98263 98241 76332f 98162->98241 98165 767f71 98166 767f7c __wwincmdln 98165->98166 98264 7632f5 58 API calls 3 library calls 98165->98264 98247 74492e 98166->98247 98169 767f90 98170 767f9f 98169->98170 98265 763598 58 API calls _doexit 98169->98265 98266 763320 58 API calls _doexit 98170->98266 98173 767fa4 _doexit 98175 76a05e 98174->98175 98175->98140 98176->98142 98267 7633c7 36 API calls 2 library calls 98177->98267 98179 769d2b 98268 769f7c InitializeCriticalSectionAndSpinCount __ioinit 98179->98268 98181 769d30 98182 769d34 98181->98182 98270 769fca TlsAlloc 98181->98270 98269 769d9c 61 API calls 2 library calls 98182->98269 98185 769d39 98185->98146 98186 769d46 98186->98182 98187 769d51 98186->98187 98271 768a15 98187->98271 98190 769d93 98279 769d9c 61 API calls 2 library calls 98190->98279 98193 769d72 98193->98190 98195 769d78 98193->98195 98194 769d98 98194->98146 98278 769c73 58 API calls 4 library calls 98195->98278 98197 769d80 GetCurrentThreadId 98197->98146 98199 76d81e _doexit 98198->98199 98200 769e4b __lock 58 API calls 98199->98200 98201 76d825 98200->98201 98202 768a15 __calloc_crt 58 API calls 98201->98202 98203 76d836 98202->98203 98204 76d8a1 GetStartupInfoW 98203->98204 98205 76d841 _doexit @_EH4_CallFilterFunc@8 98203->98205 98211 76d8b6 98204->98211 98214 76d9e5 98204->98214 98205->98150 98206 76daad 98293 76dabd LeaveCriticalSection _doexit 98206->98293 98208 768a15 __calloc_crt 58 API calls 98208->98211 98209 76da32 GetStdHandle 98209->98214 98210 76da45 GetFileType 98210->98214 98211->98208 98212 76d904 98211->98212 98211->98214 98213 76d938 GetFileType 98212->98213 98212->98214 98291 76a06b InitializeCriticalSectionAndSpinCount 98212->98291 98213->98212 98214->98206 98214->98209 98214->98210 98292 76a06b InitializeCriticalSectionAndSpinCount 98214->98292 98218 775184 98217->98218 98219 767f43 98217->98219 98294 768a5d 58 API calls __malloc_crt 98218->98294 98223 774d6b GetModuleFileNameW 98219->98223 98221 7751aa _memmove 98222 7751c0 FreeEnvironmentStringsW 98221->98222 98222->98219 98225 774d9f _wparse_cmdline 98223->98225 98224 774ddf _wparse_cmdline 98224->98157 98225->98224 98295 768a5d 58 API calls __malloc_crt 98225->98295 98228 774fc1 __NMSG_WRITE 98227->98228 98232 774fb9 98227->98232 98229 768a15 __calloc_crt 58 API calls 98228->98229 98237 774fea __NMSG_WRITE 98229->98237 98230 775041 98231 762f95 _free 58 API calls 98230->98231 98231->98232 98232->98161 98233 768a15 __calloc_crt 58 API calls 98233->98237 98234 775066 98235 762f95 _free 58 API calls 98234->98235 98235->98232 98237->98230 98237->98232 98237->98233 98237->98234 98238 77507d 98237->98238 98296 774857 58 API calls 2 library calls 98237->98296 98297 769006 IsProcessorFeaturePresent 98238->98297 98240 775089 98240->98161 98242 76333b __IsNonwritableInCurrentImage 98241->98242 98320 76a711 98242->98320 98244 763359 __initterm_e 98245 762f80 __cinit 67 API calls 98244->98245 98246 763378 _doexit __IsNonwritableInCurrentImage 98244->98246 98245->98246 98246->98165 98248 744948 98247->98248 98258 7449e7 98247->98258 98249 744982 IsThemeActive 98248->98249 98323 7635ac 98249->98323 98253 7449ae 98335 744a5b SystemParametersInfoW SystemParametersInfoW 98253->98335 98255 7449ba 98336 743b4c 98255->98336 98257 7449c2 SystemParametersInfoW 98257->98258 98258->98169 98259->98143 98260->98147 98261->98154 98265->98170 98266->98173 98267->98179 98268->98181 98269->98185 98270->98186 98274 768a1c 98271->98274 98273 768a57 98273->98190 98277 76a026 TlsSetValue 98273->98277 98274->98273 98275 768a3a 98274->98275 98280 775446 98274->98280 98275->98273 98275->98274 98288 76a372 Sleep 98275->98288 98277->98193 98278->98197 98279->98194 98281 775451 98280->98281 98285 77546c 98280->98285 98282 77545d 98281->98282 98281->98285 98289 768d68 58 API calls __getptd_noexit 98282->98289 98283 77547c RtlAllocateHeap 98283->98285 98286 775462 98283->98286 98285->98283 98285->98286 98290 7635e1 DecodePointer 98285->98290 98286->98274 98288->98275 98289->98286 98290->98285 98291->98212 98292->98214 98293->98205 98294->98221 98295->98224 98296->98237 98298 769011 98297->98298 98303 768e99 98298->98303 98302 76902c 98302->98240 98304 768eb3 _memset __call_reportfault 98303->98304 98305 768ed3 IsDebuggerPresent 98304->98305 98311 76a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 98305->98311 98308 768f97 __call_reportfault 98312 76c836 98308->98312 98309 768fba 98310 76a380 GetCurrentProcess TerminateProcess 98309->98310 98310->98302 98311->98308 98313 76c840 IsProcessorFeaturePresent 98312->98313 98314 76c83e 98312->98314 98316 775b5a 98313->98316 98314->98309 98319 775b09 5 API calls 2 library calls 98316->98319 98318 775c3d 98318->98309 98319->98318 98321 76a714 EncodePointer 98320->98321 98321->98321 98322 76a72e 98321->98322 98322->98244 98324 769e4b __lock 58 API calls 98323->98324 98325 7635b7 DecodePointer EncodePointer 98324->98325 98388 769fb5 LeaveCriticalSection 98325->98388 98327 7449a7 98328 763614 98327->98328 98329 76361e 98328->98329 98330 763638 98328->98330 98329->98330 98389 768d68 58 API calls __getptd_noexit 98329->98389 98330->98253 98332 763628 98390 768ff6 9 API calls __wsplitpath_helper 98332->98390 98334 763633 98334->98253 98335->98255 98337 743b59 __ftell_nolock 98336->98337 98338 7477c7 59 API calls 98337->98338 98339 743b63 GetCurrentDirectoryW 98338->98339 98391 743778 98339->98391 98341 743b8c IsDebuggerPresent 98342 77d4ad MessageBoxA 98341->98342 98343 743b9a 98341->98343 98345 77d4c7 98342->98345 98343->98345 98346 743bb7 98343->98346 98376 743c73 98343->98376 98344 743c7a SetCurrentDirectoryW 98347 743c87 Mailbox 98344->98347 98601 747373 59 API calls Mailbox 98345->98601 98472 7473e5 98346->98472 98347->98257 98351 77d4d7 98355 77d4ed SetCurrentDirectoryW 98351->98355 98352 743bd5 GetFullPathNameW 98353 747d2c 59 API calls 98352->98353 98354 743c10 98353->98354 98488 750a8d 98354->98488 98355->98347 98358 743c2e 98359 743c38 98358->98359 98602 7a4c03 AllocateAndInitializeSid CheckTokenMembership FreeSid 98358->98602 98504 743a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 98359->98504 98362 77d50a 98362->98359 98365 77d51b 98362->98365 98603 744864 98365->98603 98366 743c42 98376->98344 98388->98327 98389->98332 98390->98334 98392 7477c7 59 API calls 98391->98392 98393 74378e 98392->98393 98630 743d43 98393->98630 98395 7437ac 98396 744864 61 API calls 98395->98396 98397 7437c0 98396->98397 98398 747f41 59 API calls 98397->98398 98399 7437cd 98398->98399 98644 744f3d 98399->98644 98402 77d3ae 98715 7a97e5 98402->98715 98403 7437ee Mailbox 98668 7481a7 98403->98668 98406 77d3cd 98409 762f95 _free 58 API calls 98406->98409 98411 77d3da 98409->98411 98413 744faa 84 API calls 98411->98413 98415 77d3e3 98413->98415 98419 743ee2 59 API calls 98415->98419 98416 747f41 59 API calls 98417 74381a 98416->98417 98675 748620 98417->98675 98421 77d3fe 98419->98421 98420 74382c Mailbox 98422 747f41 59 API calls 98420->98422 98423 743ee2 59 API calls 98421->98423 98424 743852 98422->98424 98425 77d41a 98423->98425 98426 748620 69 API calls 98424->98426 98427 744864 61 API calls 98425->98427 98429 743861 Mailbox 98426->98429 98428 77d43f 98427->98428 98430 743ee2 59 API calls 98428->98430 98432 7477c7 59 API calls 98429->98432 98431 77d44b 98430->98431 98433 7481a7 59 API calls 98431->98433 98434 74387f 98432->98434 98435 77d459 98433->98435 98679 743ee2 98434->98679 98437 743ee2 59 API calls 98435->98437 98439 77d468 98437->98439 98445 7481a7 59 API calls 98439->98445 98441 743899 98441->98415 98442 7438a3 98441->98442 98443 76313d _W_store_winword 60 API calls 98442->98443 98444 7438ae 98443->98444 98444->98421 98446 7438b8 98444->98446 98447 77d48a 98445->98447 98448 76313d _W_store_winword 60 API calls 98446->98448 98449 743ee2 59 API calls 98447->98449 98450 7438c3 98448->98450 98451 77d497 98449->98451 98450->98425 98452 7438cd 98450->98452 98451->98451 98453 76313d _W_store_winword 60 API calls 98452->98453 98454 7438d8 98453->98454 98454->98439 98455 743919 98454->98455 98457 743ee2 59 API calls 98454->98457 98455->98439 98456 743926 98455->98456 98695 74942e 98456->98695 98459 7438fc 98457->98459 98461 7481a7 59 API calls 98459->98461 98463 74390a 98461->98463 98465 743ee2 59 API calls 98463->98465 98465->98455 98467 7493ea 59 API calls 98469 743961 98467->98469 98468 749040 60 API calls 98468->98469 98469->98467 98469->98468 98470 743ee2 59 API calls 98469->98470 98471 7439a7 Mailbox 98469->98471 98470->98469 98471->98341 98473 7473f2 __ftell_nolock 98472->98473 98474 77ee4b _memset 98473->98474 98475 74740b 98473->98475 98477 77ee67 GetOpenFileNameW 98474->98477 99581 7448ae 98475->99581 98479 77eeb6 98477->98479 98481 747d2c 59 API calls 98479->98481 98483 77eecb 98481->98483 98483->98483 98485 747429 99609 7469ca 98485->99609 98489 750a9a __ftell_nolock 98488->98489 99917 746ee0 98489->99917 98491 750a9f 98503 743c26 98491->98503 99928 7512fe 89 API calls 98491->99928 98493 750aac 98493->98503 99929 754047 91 API calls Mailbox 98493->99929 98495 750ab5 98496 750ab9 GetFullPathNameW 98495->98496 98495->98503 98497 747d2c 59 API calls 98496->98497 98498 750ae5 98497->98498 98499 747d2c 59 API calls 98498->98499 98501 750af2 98499->98501 98500 7850d5 _wcscat 98501->98500 98502 747d2c 59 API calls 98501->98502 98502->98503 98503->98351 98503->98358 98505 743ac2 LoadImageW RegisterClassExW 98504->98505 98506 77d49c 98504->98506 99972 743041 7 API calls 98505->99972 99973 7448fe LoadImageW EnumResourceNamesW 98506->99973 98509 743b46 98511 7439e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98509->98511 98510 77d4a5 98511->98366 98601->98351 98602->98362 98604 771b90 __ftell_nolock 98603->98604 98605 744871 GetModuleFileNameW 98604->98605 98606 747f41 59 API calls 98605->98606 98607 744897 98606->98607 98631 743d50 __ftell_nolock 98630->98631 98632 747d2c 59 API calls 98631->98632 98638 743eb6 Mailbox 98631->98638 98633 743d82 98632->98633 98643 743db8 Mailbox 98633->98643 98756 747b52 98633->98756 98635 747b52 59 API calls 98635->98643 98636 743e89 98637 747f41 59 API calls 98636->98637 98636->98638 98640 743eaa 98637->98640 98638->98395 98639 747f41 59 API calls 98639->98643 98641 743f84 59 API calls 98640->98641 98641->98638 98643->98635 98643->98636 98643->98638 98643->98639 98759 743f84 98643->98759 98765 744d13 98644->98765 98649 77dd0f 98652 744faa 84 API calls 98649->98652 98650 744f68 LoadLibraryExW 98775 744cc8 98650->98775 98654 77dd16 98652->98654 98656 744cc8 3 API calls 98654->98656 98658 77dd1e 98656->98658 98657 744f8f 98657->98658 98659 744f9b 98657->98659 98801 74506b 98658->98801 98661 744faa 84 API calls 98659->98661 98663 7437e6 98661->98663 98663->98402 98663->98403 98665 77dd45 98809 745027 98665->98809 98667 77dd52 98669 7481b2 98668->98669 98670 743801 98668->98670 99239 7480d7 59 API calls 2 library calls 98669->99239 98672 7493ea 98670->98672 98673 760ff6 Mailbox 59 API calls 98672->98673 98674 74380d 98673->98674 98674->98416 98676 74862b 98675->98676 98678 748652 98676->98678 99240 748b13 69 API calls Mailbox 98676->99240 98678->98420 98680 743f05 98679->98680 98681 743eec 98679->98681 98682 747d2c 59 API calls 98680->98682 98683 7481a7 59 API calls 98681->98683 98684 74388b 98682->98684 98683->98684 98685 76313d 98684->98685 98686 7631be 98685->98686 98687 763149 98685->98687 99243 7631d0 60 API calls 4 library calls 98686->99243 98694 76316e 98687->98694 99241 768d68 58 API calls __getptd_noexit 98687->99241 98690 7631cb 98690->98441 98691 763155 99242 768ff6 9 API calls __wsplitpath_helper 98691->99242 98693 763160 98693->98441 98694->98441 98696 749436 98695->98696 98697 760ff6 Mailbox 59 API calls 98696->98697 98698 749444 98697->98698 98700 743936 98698->98700 99244 74935c 59 API calls Mailbox 98698->99244 98701 7491b0 98700->98701 99245 7492c0 98701->99245 98703 7491bf 98704 760ff6 Mailbox 59 API calls 98703->98704 98705 743944 98703->98705 98704->98705 98706 749040 98705->98706 98707 77f5a5 98706->98707 98712 749057 98706->98712 98707->98712 99255 748d3b 59 API calls Mailbox 98707->99255 98709 7491a0 99254 749e9c 60 API calls Mailbox 98709->99254 98710 749158 98713 760ff6 Mailbox 59 API calls 98710->98713 98712->98709 98712->98710 98714 74915f 98712->98714 98713->98714 98714->98469 98716 745045 85 API calls 98715->98716 98717 7a9854 98716->98717 99256 7a99be 98717->99256 98720 74506b 74 API calls 98721 7a9881 98720->98721 98722 74506b 74 API calls 98721->98722 98723 7a9891 98722->98723 98724 74506b 74 API calls 98723->98724 98725 7a98ac 98724->98725 98726 74506b 74 API calls 98725->98726 98727 7a98c7 98726->98727 98728 745045 85 API calls 98727->98728 98729 7a98de 98728->98729 98730 76594c __malloc_crt 58 API calls 98729->98730 98731 7a98e5 98730->98731 98732 76594c __malloc_crt 58 API calls 98731->98732 98733 7a98ef 98732->98733 98734 74506b 74 API calls 98733->98734 98735 7a9903 98734->98735 98736 7a9393 GetSystemTimeAsFileTime 98735->98736 98737 7a9916 98736->98737 98738 7a992b 98737->98738 98739 7a9940 98737->98739 98740 762f95 _free 58 API calls 98738->98740 98741 7a9946 98739->98741 98742 7a99a5 98739->98742 98744 7a9931 98740->98744 99262 7a8d90 98741->99262 98743 762f95 _free 58 API calls 98742->98743 98746 77d3c1 98743->98746 98747 762f95 _free 58 API calls 98744->98747 98746->98406 98750 744faa 98746->98750 98747->98746 98749 762f95 _free 58 API calls 98749->98746 98751 744fb4 98750->98751 98752 744fbb 98750->98752 98753 7655d6 __fcloseall 83 API calls 98751->98753 98754 744fca 98752->98754 98755 744fdb FreeLibrary 98752->98755 98753->98752 98754->98406 98755->98754 98757 747faf 59 API calls 98756->98757 98758 747b5d 98757->98758 98758->98633 98760 743f92 98759->98760 98764 743fb4 _memmove 98759->98764 98762 760ff6 Mailbox 59 API calls 98760->98762 98761 760ff6 Mailbox 59 API calls 98763 743fc8 98761->98763 98762->98764 98763->98643 98764->98761 98814 744d61 98765->98814 98768 744d53 98772 76548b 98768->98772 98769 744d4a FreeLibrary 98769->98768 98770 744d61 2 API calls 98771 744d3a 98770->98771 98771->98768 98771->98769 98818 7654a0 98772->98818 98774 744f5c 98774->98649 98774->98650 98976 744d94 98775->98976 98778 744ced 98780 744cff FreeLibrary 98778->98780 98781 744d08 98778->98781 98779 744d94 2 API calls 98779->98778 98780->98781 98782 744dd0 98781->98782 98783 760ff6 Mailbox 59 API calls 98782->98783 98784 744de5 98783->98784 98980 74538e 98784->98980 98786 744df1 _memmove 98787 744e2c 98786->98787 98789 744f21 98786->98789 98790 744ee9 98786->98790 98788 745027 69 API calls 98787->98788 98800 744e35 98788->98800 98994 7a9ba5 95 API calls 98789->98994 98983 744fe9 CreateStreamOnHGlobal 98790->98983 98793 74506b 74 API calls 98793->98800 98795 744ec9 98795->98657 98796 77dcd0 98797 745045 85 API calls 98796->98797 98798 77dce4 98797->98798 98799 74506b 74 API calls 98798->98799 98799->98795 98800->98793 98800->98795 98800->98796 98989 745045 98800->98989 98802 77ddf6 98801->98802 98803 74507d 98801->98803 99018 765812 98803->99018 98806 7a9393 99216 7a91e9 98806->99216 98808 7a93a9 98808->98665 98810 745036 98809->98810 98813 77ddb9 98809->98813 99221 765e90 98810->99221 98812 74503e 98812->98667 98815 744d2e 98814->98815 98816 744d6a LoadLibraryA 98814->98816 98815->98770 98815->98771 98816->98815 98817 744d7b GetProcAddress 98816->98817 98817->98815 98820 7654ac _doexit 98818->98820 98819 7654bf 98867 768d68 58 API calls __getptd_noexit 98819->98867 98820->98819 98822 7654f0 98820->98822 98837 770738 98822->98837 98823 7654c4 98868 768ff6 9 API calls __wsplitpath_helper 98823->98868 98826 7654f5 98827 7654fe 98826->98827 98828 76550b 98826->98828 98869 768d68 58 API calls __getptd_noexit 98827->98869 98830 765535 98828->98830 98831 765515 98828->98831 98852 770857 98830->98852 98870 768d68 58 API calls __getptd_noexit 98831->98870 98832 7654cf _doexit @_EH4_CallFilterFunc@8 98832->98774 98838 770744 _doexit 98837->98838 98839 769e4b __lock 58 API calls 98838->98839 98850 770752 98839->98850 98840 7707c6 98872 77084e 98840->98872 98841 7707cd 98877 768a5d 58 API calls __malloc_crt 98841->98877 98844 7707d4 98844->98840 98878 76a06b InitializeCriticalSectionAndSpinCount 98844->98878 98845 770843 _doexit 98845->98826 98847 769ed3 __mtinitlocknum 58 API calls 98847->98850 98849 7707fa EnterCriticalSection 98849->98840 98850->98840 98850->98841 98850->98847 98875 766e8d 59 API calls __lock 98850->98875 98876 766ef7 LeaveCriticalSection LeaveCriticalSection _doexit 98850->98876 98860 770877 __wopenfile 98852->98860 98853 770891 98883 768d68 58 API calls __getptd_noexit 98853->98883 98855 770896 98884 768ff6 9 API calls __wsplitpath_helper 98855->98884 98857 770aaf 98880 7787f1 98857->98880 98858 765540 98871 765562 LeaveCriticalSection LeaveCriticalSection _fprintf 98858->98871 98860->98853 98866 770a4c 98860->98866 98885 763a0b 60 API calls 3 library calls 98860->98885 98862 770a45 98862->98866 98886 763a0b 60 API calls 3 library calls 98862->98886 98864 770a64 98864->98866 98887 763a0b 60 API calls 3 library calls 98864->98887 98866->98853 98866->98857 98867->98823 98868->98832 98869->98832 98870->98832 98871->98832 98879 769fb5 LeaveCriticalSection 98872->98879 98874 770855 98874->98845 98875->98850 98876->98850 98877->98844 98878->98849 98879->98874 98888 777fd5 98880->98888 98882 77880a 98882->98858 98883->98855 98884->98858 98885->98862 98886->98864 98887->98866 98891 777fe1 _doexit 98888->98891 98889 777ff7 98973 768d68 58 API calls __getptd_noexit 98889->98973 98891->98889 98893 77802d 98891->98893 98892 777ffc 98974 768ff6 9 API calls __wsplitpath_helper 98892->98974 98899 77809e 98893->98899 98896 778049 98975 778072 LeaveCriticalSection __unlock_fhandle 98896->98975 98898 778006 _doexit 98898->98882 98900 7780be 98899->98900 98901 76471a __wsopen_nolock 58 API calls 98900->98901 98904 7780da 98901->98904 98902 769006 __invoke_watson 8 API calls 98903 7787f0 98902->98903 98906 777fd5 __wsopen_helper 103 API calls 98903->98906 98905 778114 98904->98905 98912 778137 98904->98912 98947 778211 98904->98947 98907 768d34 __commit 58 API calls 98905->98907 98908 77880a 98906->98908 98909 778119 98907->98909 98908->98896 98910 768d68 _free 58 API calls 98909->98910 98911 778126 98910->98911 98914 768ff6 __wsplitpath_helper 9 API calls 98911->98914 98913 7781f5 98912->98913 98921 7781d3 98912->98921 98915 768d34 __commit 58 API calls 98913->98915 98916 778130 98914->98916 98917 7781fa 98915->98917 98916->98896 98918 768d68 _free 58 API calls 98917->98918 98919 778207 98918->98919 98920 768ff6 __wsplitpath_helper 9 API calls 98919->98920 98920->98947 98922 76d4d4 __alloc_osfhnd 61 API calls 98921->98922 98923 7782a1 98922->98923 98924 7782ce 98923->98924 98925 7782ab 98923->98925 98927 777f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98924->98927 98926 768d34 __commit 58 API calls 98925->98926 98928 7782b0 98926->98928 98938 7782f0 98927->98938 98929 768d68 _free 58 API calls 98928->98929 98931 7782ba 98929->98931 98930 77836e GetFileType 98932 7783bb 98930->98932 98933 778379 GetLastError 98930->98933 98936 768d68 _free 58 API calls 98931->98936 98942 76d76a __set_osfhnd 59 API calls 98932->98942 98937 768d47 __dosmaperr 58 API calls 98933->98937 98934 77833c GetLastError 98935 768d47 __dosmaperr 58 API calls 98934->98935 98939 778361 98935->98939 98936->98916 98940 7783a0 CloseHandle 98937->98940 98938->98930 98938->98934 98941 777f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98938->98941 98945 768d68 _free 58 API calls 98939->98945 98940->98939 98943 7783ae 98940->98943 98944 778331 98941->98944 98950 7783d9 98942->98950 98946 768d68 _free 58 API calls 98943->98946 98944->98930 98944->98934 98945->98947 98948 7783b3 98946->98948 98947->98902 98948->98939 98949 778594 98949->98947 98952 778767 CloseHandle 98949->98952 98950->98949 98951 771b11 __lseeki64_nolock 60 API calls 98950->98951 98969 77845a 98950->98969 98953 778443 98951->98953 98954 777f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98952->98954 98956 768d34 __commit 58 API calls 98953->98956 98953->98969 98955 77878e 98954->98955 98957 778796 GetLastError 98955->98957 98958 7787c2 98955->98958 98956->98969 98959 768d47 __dosmaperr 58 API calls 98957->98959 98958->98947 98961 7787a2 98959->98961 98960 77848c 98964 7799f2 __chsize_nolock 82 API calls 98960->98964 98960->98969 98965 76d67d __free_osfhnd 59 API calls 98961->98965 98962 7710ab 70 API calls __read_nolock 98962->98969 98963 770d2d __close_nolock 61 API calls 98963->98969 98964->98960 98965->98958 98966 76dac6 __write 78 API calls 98966->98969 98967 778611 98968 770d2d __close_nolock 61 API calls 98967->98968 98970 778618 98968->98970 98969->98949 98969->98960 98969->98962 98969->98963 98969->98966 98969->98967 98971 771b11 60 API calls __lseeki64_nolock 98969->98971 98972 768d68 _free 58 API calls 98970->98972 98971->98969 98972->98947 98973->98892 98974->98898 98975->98898 98977 744ce1 98976->98977 98978 744d9d LoadLibraryA 98976->98978 98977->98778 98977->98779 98978->98977 98979 744dae GetProcAddress 98978->98979 98979->98977 98981 760ff6 Mailbox 59 API calls 98980->98981 98982 7453a0 98981->98982 98982->98786 98984 745003 FindResourceExW 98983->98984 98985 745020 98983->98985 98984->98985 98986 77dd5c LoadResource 98984->98986 98985->98787 98986->98985 98987 77dd71 SizeofResource 98986->98987 98987->98985 98988 77dd85 LockResource 98987->98988 98988->98985 98990 745054 98989->98990 98991 77ddd4 98989->98991 98995 765a7d 98990->98995 98993 745062 98993->98800 98994->98787 98996 765a89 _doexit 98995->98996 98997 765a9b 98996->98997 98999 765ac1 98996->98999 99008 768d68 58 API calls __getptd_noexit 98997->99008 99010 766e4e 98999->99010 99000 765aa0 99009 768ff6 9 API calls __wsplitpath_helper 99000->99009 99003 765ac7 99016 7659ee 83 API calls 5 library calls 99003->99016 99005 765ad6 99017 765af8 LeaveCriticalSection LeaveCriticalSection _fprintf 99005->99017 99007 765aab _doexit 99007->98993 99008->99000 99009->99007 99011 766e80 EnterCriticalSection 99010->99011 99012 766e5e 99010->99012 99014 766e76 99011->99014 99012->99011 99013 766e66 99012->99013 99015 769e4b __lock 58 API calls 99013->99015 99014->99003 99015->99014 99016->99005 99017->99007 99021 76582d 99018->99021 99020 74508e 99020->98806 99022 765839 _doexit 99021->99022 99023 76587c 99022->99023 99024 765874 _doexit 99022->99024 99026 76584f _memset 99022->99026 99025 766e4e __lock_file 59 API calls 99023->99025 99024->99020 99028 765882 99025->99028 99048 768d68 58 API calls __getptd_noexit 99026->99048 99034 76564d 99028->99034 99030 765869 99049 768ff6 9 API calls __wsplitpath_helper 99030->99049 99038 765668 _memset 99034->99038 99040 765683 99034->99040 99035 765673 99146 768d68 58 API calls __getptd_noexit 99035->99146 99037 765678 99147 768ff6 9 API calls __wsplitpath_helper 99037->99147 99038->99035 99038->99040 99043 7656c3 99038->99043 99050 7658b6 LeaveCriticalSection LeaveCriticalSection _fprintf 99040->99050 99042 7657d4 _memset 99149 768d68 58 API calls __getptd_noexit 99042->99149 99043->99040 99043->99042 99051 764916 99043->99051 99058 7710ab 99043->99058 99126 770df7 99043->99126 99148 770f18 58 API calls 4 library calls 99043->99148 99048->99030 99049->99024 99050->99024 99052 764935 99051->99052 99053 764920 99051->99053 99052->99043 99150 768d68 58 API calls __getptd_noexit 99053->99150 99055 764925 99151 768ff6 9 API calls __wsplitpath_helper 99055->99151 99057 764930 99057->99043 99059 7710e3 99058->99059 99060 7710cc 99058->99060 99061 77181b 99059->99061 99065 77111d 99059->99065 99161 768d34 58 API calls __getptd_noexit 99060->99161 99177 768d34 58 API calls __getptd_noexit 99061->99177 99064 7710d1 99162 768d68 58 API calls __getptd_noexit 99064->99162 99068 771125 99065->99068 99075 77113c 99065->99075 99066 771820 99178 768d68 58 API calls __getptd_noexit 99066->99178 99163 768d34 58 API calls __getptd_noexit 99068->99163 99071 771131 99179 768ff6 9 API calls __wsplitpath_helper 99071->99179 99072 77112a 99164 768d68 58 API calls __getptd_noexit 99072->99164 99074 771151 99165 768d34 58 API calls __getptd_noexit 99074->99165 99075->99074 99076 77116b 99075->99076 99079 771189 99075->99079 99106 7710d8 99075->99106 99076->99074 99081 771176 99076->99081 99166 768a5d 58 API calls __malloc_crt 99079->99166 99152 775ebb 99081->99152 99082 771199 99084 7711a1 99082->99084 99085 7711bc 99082->99085 99167 768d68 58 API calls __getptd_noexit 99084->99167 99169 771b11 60 API calls 3 library calls 99085->99169 99086 77128a 99089 771303 ReadFile 99086->99089 99090 7712a0 GetConsoleMode 99086->99090 99092 771325 99089->99092 99093 7717e3 GetLastError 99089->99093 99094 7712b4 99090->99094 99095 771300 99090->99095 99091 7711a6 99168 768d34 58 API calls __getptd_noexit 99091->99168 99092->99093 99100 7712f5 99092->99100 99097 7712e3 99093->99097 99098 7717f0 99093->99098 99094->99095 99099 7712ba ReadConsoleW 99094->99099 99095->99089 99108 7712e9 99097->99108 99170 768d47 58 API calls 2 library calls 99097->99170 99175 768d68 58 API calls __getptd_noexit 99098->99175 99099->99100 99102 7712dd GetLastError 99099->99102 99100->99108 99109 77135a 99100->99109 99112 7715c7 99100->99112 99102->99097 99104 7717f5 99176 768d34 58 API calls __getptd_noexit 99104->99176 99106->99043 99107 762f95 _free 58 API calls 99107->99106 99108->99106 99108->99107 99111 7713c6 ReadFile 99109->99111 99119 771447 99109->99119 99114 7713e7 GetLastError 99111->99114 99124 7713f1 99111->99124 99112->99108 99113 7716cd ReadFile 99112->99113 99118 7716f0 GetLastError 99113->99118 99125 7716fe 99113->99125 99114->99124 99115 771504 99120 7714b4 MultiByteToWideChar 99115->99120 99173 771b11 60 API calls 3 library calls 99115->99173 99116 7714f4 99172 768d68 58 API calls __getptd_noexit 99116->99172 99118->99125 99119->99108 99119->99115 99119->99116 99119->99120 99120->99102 99120->99108 99124->99109 99171 771b11 60 API calls 3 library calls 99124->99171 99125->99112 99174 771b11 60 API calls 3 library calls 99125->99174 99127 770e17 99126->99127 99128 770e02 99126->99128 99132 770e4c 99127->99132 99137 770e12 99127->99137 99215 776234 58 API calls __malloc_crt 99127->99215 99213 768d68 58 API calls __getptd_noexit 99128->99213 99130 770e07 99214 768ff6 9 API calls __wsplitpath_helper 99130->99214 99134 764916 __fclose_nolock 58 API calls 99132->99134 99135 770e60 99134->99135 99180 770f97 99135->99180 99137->99043 99138 770e67 99138->99137 99139 764916 __fclose_nolock 58 API calls 99138->99139 99140 770e8a 99139->99140 99140->99137 99141 764916 __fclose_nolock 58 API calls 99140->99141 99142 770e96 99141->99142 99142->99137 99143 764916 __fclose_nolock 58 API calls 99142->99143 99144 770ea3 99143->99144 99145 764916 __fclose_nolock 58 API calls 99144->99145 99145->99137 99146->99037 99147->99040 99148->99043 99149->99037 99150->99055 99151->99057 99153 775ec6 99152->99153 99154 775ed3 99152->99154 99155 768d68 _free 58 API calls 99153->99155 99157 775edf 99154->99157 99158 768d68 _free 58 API calls 99154->99158 99156 775ecb 99155->99156 99156->99086 99157->99086 99159 775f00 99158->99159 99160 768ff6 __wsplitpath_helper 9 API calls 99159->99160 99160->99156 99161->99064 99162->99106 99163->99072 99164->99071 99165->99072 99166->99082 99167->99091 99168->99106 99169->99081 99170->99108 99171->99124 99172->99108 99173->99120 99174->99125 99175->99104 99176->99108 99177->99066 99178->99071 99179->99106 99181 770fa3 _doexit 99180->99181 99182 770fc7 99181->99182 99183 770fb0 99181->99183 99184 77108b 99182->99184 99186 770fdb 99182->99186 99185 768d34 __commit 58 API calls 99183->99185 99187 768d34 __commit 58 API calls 99184->99187 99188 770fb5 99185->99188 99189 771006 99186->99189 99190 770ff9 99186->99190 99195 770ffe 99187->99195 99191 768d68 _free 58 API calls 99188->99191 99193 771013 99189->99193 99194 771028 99189->99194 99192 768d34 __commit 58 API calls 99190->99192 99202 770fbc _doexit 99191->99202 99192->99195 99196 768d34 __commit 58 API calls 99193->99196 99197 76d446 ___lock_fhandle 59 API calls 99194->99197 99198 768d68 _free 58 API calls 99195->99198 99199 771018 99196->99199 99200 77102e 99197->99200 99201 771020 99198->99201 99203 768d68 _free 58 API calls 99199->99203 99204 771054 99200->99204 99205 771041 99200->99205 99207 768ff6 __wsplitpath_helper 9 API calls 99201->99207 99202->99138 99203->99201 99208 768d68 _free 58 API calls 99204->99208 99206 7710ab __read_nolock 70 API calls 99205->99206 99209 77104d 99206->99209 99207->99202 99210 771059 99208->99210 99212 771083 __read LeaveCriticalSection 99209->99212 99211 768d34 __commit 58 API calls 99210->99211 99211->99209 99212->99202 99213->99130 99214->99137 99215->99132 99219 76543a GetSystemTimeAsFileTime 99216->99219 99218 7a91f8 99218->98808 99220 765468 __aulldiv 99219->99220 99220->99218 99222 765e9c _doexit 99221->99222 99223 765ec3 99222->99223 99224 765eae 99222->99224 99225 766e4e __lock_file 59 API calls 99223->99225 99235 768d68 58 API calls __getptd_noexit 99224->99235 99227 765ec9 99225->99227 99237 765b00 67 API calls 7 library calls 99227->99237 99228 765eb3 99236 768ff6 9 API calls __wsplitpath_helper 99228->99236 99231 765ed4 99238 765ef4 LeaveCriticalSection LeaveCriticalSection _fprintf 99231->99238 99233 765ee6 99234 765ebe _doexit 99233->99234 99234->98812 99235->99228 99236->99234 99237->99231 99238->99233 99239->98670 99240->98678 99241->98691 99242->98693 99243->98690 99244->98700 99246 7492c9 Mailbox 99245->99246 99247 77f5c8 99246->99247 99252 7492d3 99246->99252 99248 760ff6 Mailbox 59 API calls 99247->99248 99250 77f5d4 99248->99250 99249 7492da 99249->98703 99252->99249 99253 749df0 59 API calls Mailbox 99252->99253 99253->99252 99254->98714 99255->98712 99257 7a99d2 __tzset_nolock _wcscmp 99256->99257 99258 74506b 74 API calls 99257->99258 99259 7a9866 99257->99259 99260 7a9393 GetSystemTimeAsFileTime 99257->99260 99261 745045 85 API calls 99257->99261 99258->99257 99259->98720 99259->98746 99260->99257 99261->99257 99263 7a8da9 99262->99263 99264 7a8d9b 99262->99264 99266 7a8dee 99263->99266 99267 76548b 115 API calls 99263->99267 99292 7a8db2 99263->99292 99265 76548b 115 API calls 99264->99265 99265->99263 99293 7a901b 99266->99293 99269 7a8dd3 99267->99269 99269->99266 99271 7a8ddc 99269->99271 99270 7a8e32 99272 7a8e36 99270->99272 99273 7a8e57 99270->99273 99275 7655d6 __fcloseall 83 API calls 99271->99275 99271->99292 99274 7a8e43 99272->99274 99278 7655d6 __fcloseall 83 API calls 99272->99278 99297 7a8c33 99273->99297 99281 7655d6 __fcloseall 83 API calls 99274->99281 99274->99292 99275->99292 99278->99274 99279 7a8e85 99306 7a8eb5 99279->99306 99280 7a8e65 99282 7a8e72 99280->99282 99284 7655d6 __fcloseall 83 API calls 99280->99284 99281->99292 99286 7655d6 __fcloseall 83 API calls 99282->99286 99282->99292 99284->99282 99286->99292 99289 7a8ea0 99291 7655d6 __fcloseall 83 API calls 99289->99291 99289->99292 99291->99292 99292->98749 99294 7a9040 99293->99294 99296 7a9029 __tzset_nolock _memmove 99293->99296 99295 765812 __fread_nolock 74 API calls 99294->99295 99295->99296 99296->99270 99298 76594c __malloc_crt 58 API calls 99297->99298 99299 7a8c42 99298->99299 99300 76594c __malloc_crt 58 API calls 99299->99300 99301 7a8c56 99300->99301 99302 76594c __malloc_crt 58 API calls 99301->99302 99303 7a8c6a 99302->99303 99304 7a8f97 58 API calls 99303->99304 99305 7a8c7d 99303->99305 99304->99305 99305->99279 99305->99280 99313 7a8eca 99306->99313 99307 7a8f82 99339 7a91bf 99307->99339 99308 7a8c8f 74 API calls 99308->99313 99310 7a8e8c 99314 7a8f97 99310->99314 99313->99307 99313->99308 99313->99310 99335 7a909c 99313->99335 99343 7a8d2b 74 API calls 99313->99343 99315 7a8fa4 99314->99315 99318 7a8faa 99314->99318 99316 762f95 _free 58 API calls 99315->99316 99316->99318 99317 7a8fbb 99320 7a8e93 99317->99320 99321 762f95 _free 58 API calls 99317->99321 99318->99317 99319 762f95 _free 58 API calls 99318->99319 99319->99317 99320->99289 99322 7655d6 99320->99322 99321->99320 99323 7655e2 _doexit 99322->99323 99324 7655f6 99323->99324 99325 76560e 99323->99325 99392 768d68 58 API calls __getptd_noexit 99324->99392 99327 766e4e __lock_file 59 API calls 99325->99327 99332 765606 _doexit 99325->99332 99329 765620 99327->99329 99328 7655fb 99393 768ff6 9 API calls __wsplitpath_helper 99328->99393 99376 76556a 99329->99376 99332->99289 99337 7a90ab 99335->99337 99338 7a90eb 99335->99338 99337->99313 99338->99337 99344 7a9172 99338->99344 99340 7a91cc 99339->99340 99341 7a91dd 99339->99341 99342 764a93 80 API calls 99340->99342 99341->99310 99342->99341 99343->99313 99345 7a91af 99344->99345 99346 7a919e 99344->99346 99345->99338 99348 764a93 99346->99348 99349 764a9f _doexit 99348->99349 99350 764ad5 99349->99350 99351 764abd 99349->99351 99352 764acd _doexit 99349->99352 99353 766e4e __lock_file 59 API calls 99350->99353 99373 768d68 58 API calls __getptd_noexit 99351->99373 99352->99345 99355 764adb 99353->99355 99361 76493a 99355->99361 99356 764ac2 99374 768ff6 9 API calls __wsplitpath_helper 99356->99374 99364 764949 99361->99364 99369 764967 99361->99369 99362 764957 99363 768d68 _free 58 API calls 99362->99363 99365 76495c 99363->99365 99364->99362 99366 764981 _memmove 99364->99366 99364->99369 99367 768ff6 __wsplitpath_helper 9 API calls 99365->99367 99368 76b05e __flsbuf 78 API calls 99366->99368 99366->99369 99370 764c6d __flush 78 API calls 99366->99370 99371 764916 __fclose_nolock 58 API calls 99366->99371 99372 76dac6 __write 78 API calls 99366->99372 99367->99369 99368->99366 99375 764b0d LeaveCriticalSection LeaveCriticalSection _fprintf 99369->99375 99370->99366 99371->99366 99372->99366 99373->99356 99374->99352 99375->99352 99377 76558d 99376->99377 99378 765579 99376->99378 99384 765589 99377->99384 99395 764c6d 99377->99395 99431 768d68 58 API calls __getptd_noexit 99378->99431 99380 76557e 99432 768ff6 9 API calls __wsplitpath_helper 99380->99432 99394 765645 LeaveCriticalSection LeaveCriticalSection _fprintf 99384->99394 99387 764916 __fclose_nolock 58 API calls 99388 7655a7 99387->99388 99405 770c52 99388->99405 99390 7655ad 99390->99384 99391 762f95 _free 58 API calls 99390->99391 99391->99384 99392->99328 99393->99332 99394->99332 99396 764c80 99395->99396 99400 764ca4 99395->99400 99397 764916 __fclose_nolock 58 API calls 99396->99397 99396->99400 99398 764c9d 99397->99398 99433 76dac6 99398->99433 99401 770dc7 99400->99401 99402 7655a1 99401->99402 99403 770dd4 99401->99403 99402->99387 99403->99402 99404 762f95 _free 58 API calls 99403->99404 99404->99402 99406 770c5e _doexit 99405->99406 99407 770c82 99406->99407 99408 770c6b 99406->99408 99410 770d0d 99407->99410 99412 770c92 99407->99412 99558 768d34 58 API calls __getptd_noexit 99408->99558 99563 768d34 58 API calls __getptd_noexit 99410->99563 99411 770c70 99559 768d68 58 API calls __getptd_noexit 99411->99559 99415 770cb0 99412->99415 99416 770cba 99412->99416 99560 768d34 58 API calls __getptd_noexit 99415->99560 99420 76d446 ___lock_fhandle 59 API calls 99416->99420 99417 770cb5 99564 768d68 58 API calls __getptd_noexit 99417->99564 99418 770c77 _doexit 99418->99390 99422 770cc0 99420->99422 99424 770cd3 99422->99424 99425 770cde 99422->99425 99423 770d19 99565 768ff6 9 API calls __wsplitpath_helper 99423->99565 99543 770d2d 99424->99543 99561 768d68 58 API calls __getptd_noexit 99425->99561 99429 770cd9 99562 770d05 LeaveCriticalSection __unlock_fhandle 99429->99562 99431->99380 99432->99384 99434 76dad2 _doexit 99433->99434 99435 76daf6 99434->99435 99436 76dadf 99434->99436 99437 76db95 99435->99437 99439 76db0a 99435->99439 99534 768d34 58 API calls __getptd_noexit 99436->99534 99540 768d34 58 API calls __getptd_noexit 99437->99540 99442 76db32 99439->99442 99443 76db28 99439->99443 99441 76dae4 99535 768d68 58 API calls __getptd_noexit 99441->99535 99461 76d446 99442->99461 99536 768d34 58 API calls __getptd_noexit 99443->99536 99444 76db2d 99541 768d68 58 API calls __getptd_noexit 99444->99541 99448 76db38 99450 76db5e 99448->99450 99451 76db4b 99448->99451 99537 768d68 58 API calls __getptd_noexit 99450->99537 99470 76dbb5 99451->99470 99452 76dba1 99542 768ff6 9 API calls __wsplitpath_helper 99452->99542 99456 76daeb _doexit 99456->99400 99457 76db57 99539 76db8d LeaveCriticalSection __unlock_fhandle 99457->99539 99458 76db63 99538 768d34 58 API calls __getptd_noexit 99458->99538 99462 76d452 _doexit 99461->99462 99463 76d4a1 EnterCriticalSection 99462->99463 99465 769e4b __lock 58 API calls 99462->99465 99464 76d4c7 _doexit 99463->99464 99464->99448 99466 76d477 99465->99466 99467 76d48f 99466->99467 99468 76a06b __ioinit InitializeCriticalSectionAndSpinCount 99466->99468 99469 76d4cb ___lock_fhandle LeaveCriticalSection 99467->99469 99468->99467 99469->99463 99471 76dbc2 __ftell_nolock 99470->99471 99472 76dc01 99471->99472 99473 76dc20 99471->99473 99501 76dbf6 99471->99501 99475 768d34 __commit 58 API calls 99472->99475 99476 76dc78 99473->99476 99477 76dc5c 99473->99477 99474 76c836 __fltin2 6 API calls 99478 76e416 99474->99478 99479 76dc06 99475->99479 99481 76dc91 99476->99481 99485 771b11 __lseeki64_nolock 60 API calls 99476->99485 99480 768d34 __commit 58 API calls 99477->99480 99478->99457 99482 768d68 _free 58 API calls 99479->99482 99484 76dc61 99480->99484 99483 775ebb __flsbuf 58 API calls 99481->99483 99486 76dc0d 99482->99486 99487 76dc9f 99483->99487 99488 768d68 _free 58 API calls 99484->99488 99485->99481 99489 768ff6 __wsplitpath_helper 9 API calls 99486->99489 99490 76dff8 99487->99490 99495 769bec _LocaleUpdate::_LocaleUpdate 58 API calls 99487->99495 99491 76dc68 99488->99491 99489->99501 99492 76e016 99490->99492 99493 76e38b WriteFile 99490->99493 99494 768ff6 __wsplitpath_helper 9 API calls 99491->99494 99496 76e13a 99492->99496 99504 76e02c 99492->99504 99497 76dfeb GetLastError 99493->99497 99502 76dfb8 99493->99502 99494->99501 99498 76dccb GetConsoleMode 99495->99498 99509 76e22f 99496->99509 99511 76e145 99496->99511 99497->99502 99498->99490 99500 76dd0a 99498->99500 99499 76e3c4 99499->99501 99506 768d68 _free 58 API calls 99499->99506 99500->99490 99503 76dd1a GetConsoleCP 99500->99503 99501->99474 99502->99499 99502->99501 99508 76e118 99502->99508 99503->99499 99530 76dd49 99503->99530 99504->99499 99505 76e09b WriteFile 99504->99505 99505->99497 99510 76e0d8 99505->99510 99507 76e3f2 99506->99507 99512 768d34 __commit 58 API calls 99507->99512 99513 76e123 99508->99513 99514 76e3bb 99508->99514 99509->99499 99515 76e2a4 WideCharToMultiByte 99509->99515 99510->99504 99516 76e0fc 99510->99516 99511->99499 99517 76e1aa WriteFile 99511->99517 99512->99501 99519 768d68 _free 58 API calls 99513->99519 99520 768d47 __dosmaperr 58 API calls 99514->99520 99515->99497 99526 76e2eb 99515->99526 99516->99502 99517->99497 99518 76e1f9 99517->99518 99518->99502 99518->99511 99518->99516 99521 76e128 99519->99521 99520->99501 99523 768d34 __commit 58 API calls 99521->99523 99522 76e2f3 WriteFile 99525 76e346 GetLastError 99522->99525 99522->99526 99523->99501 99524 763835 __write_nolock 58 API calls 99524->99530 99525->99526 99526->99502 99526->99509 99526->99516 99526->99522 99527 77650a 60 API calls __write_nolock 99527->99530 99528 76de32 WideCharToMultiByte 99528->99502 99529 76de6d WriteFile 99528->99529 99529->99497 99532 76de9f 99529->99532 99530->99502 99530->99524 99530->99527 99530->99528 99530->99532 99531 777cae WriteConsoleW CreateFileW __putwch_nolock 99531->99532 99532->99497 99532->99502 99532->99530 99532->99531 99533 76dec7 WriteFile 99532->99533 99533->99497 99533->99532 99534->99441 99535->99456 99536->99444 99537->99458 99538->99457 99539->99456 99540->99444 99541->99452 99542->99456 99566 76d703 99543->99566 99545 770d91 99579 76d67d 59 API calls 2 library calls 99545->99579 99547 770d3b 99547->99545 99549 76d703 __close_nolock 58 API calls 99547->99549 99557 770d6f 99547->99557 99548 770d99 99556 770dbb 99548->99556 99580 768d47 58 API calls 2 library calls 99548->99580 99551 770d66 99549->99551 99550 76d703 __close_nolock 58 API calls 99552 770d7b FindCloseChangeNotification 99550->99552 99555 76d703 __close_nolock 58 API calls 99551->99555 99552->99545 99553 770d87 GetLastError 99552->99553 99553->99545 99555->99557 99556->99429 99557->99545 99557->99550 99558->99411 99559->99418 99560->99417 99561->99429 99562->99418 99563->99417 99564->99423 99565->99418 99567 76d723 99566->99567 99568 76d70e 99566->99568 99571 768d34 __commit 58 API calls 99567->99571 99573 76d748 99567->99573 99569 768d34 __commit 58 API calls 99568->99569 99570 76d713 99569->99570 99572 768d68 _free 58 API calls 99570->99572 99574 76d752 99571->99574 99575 76d71b 99572->99575 99573->99547 99576 768d68 _free 58 API calls 99574->99576 99575->99547 99577 76d75a 99576->99577 99578 768ff6 __wsplitpath_helper 9 API calls 99577->99578 99578->99575 99579->99548 99580->99556 99643 771b90 99581->99643 99584 7448f7 99645 747eec 99584->99645 99585 7448da 99586 747d2c 59 API calls 99585->99586 99588 7448e6 99586->99588 99589 747886 59 API calls 99588->99589 99590 7448f2 99589->99590 99591 7609d5 99590->99591 99592 771b90 __ftell_nolock 99591->99592 99593 7609e2 GetLongPathNameW 99592->99593 99594 747d2c 59 API calls 99593->99594 99595 74741d 99594->99595 99596 74716b 99595->99596 99597 7477c7 59 API calls 99596->99597 99598 74717d 99597->99598 99599 7448ae 60 API calls 99598->99599 99600 747188 99599->99600 99601 747193 99600->99601 99605 77ecae 99600->99605 99603 743f84 59 API calls 99601->99603 99604 74719f 99603->99604 99649 7434c2 99604->99649 99606 77ecc8 99605->99606 99655 747a68 61 API calls 99605->99655 99608 7471b2 Mailbox 99608->98485 99610 744f3d 136 API calls 99609->99610 99611 7469ef 99610->99611 99612 77e45a 99611->99612 99614 744f3d 136 API calls 99611->99614 99613 7a97e5 122 API calls 99612->99613 99615 77e46f 99613->99615 99616 746a03 99614->99616 99617 77e473 99615->99617 99618 77e490 99615->99618 99616->99612 99619 746a0b 99616->99619 99622 744faa 84 API calls 99617->99622 99623 760ff6 Mailbox 59 API calls 99618->99623 99620 746a17 99619->99620 99621 77e47b 99619->99621 99656 746bec 99620->99656 99749 7a4534 90 API calls _wprintf 99621->99749 99622->99621 99632 77e4d5 Mailbox 99623->99632 99627 77e489 99627->99618 99628 77e689 99629 762f95 _free 58 API calls 99628->99629 99630 77e691 99629->99630 99631 744faa 84 API calls 99630->99631 99636 77e69a 99631->99636 99632->99628 99632->99636 99640 747f41 59 API calls 99632->99640 99750 79fc4d 59 API calls 2 library calls 99632->99750 99751 79fb6e 61 API calls 2 library calls 99632->99751 99752 7a7621 59 API calls Mailbox 99632->99752 99753 74766f 59 API calls 2 library calls 99632->99753 99754 7474bd 59 API calls Mailbox 99632->99754 99637 762f95 _free 58 API calls 99636->99637 99638 744faa 84 API calls 99636->99638 99755 79fcb1 89 API calls 4 library calls 99636->99755 99637->99636 99638->99636 99640->99632 99644 7448bb GetFullPathNameW 99643->99644 99644->99584 99644->99585 99646 747f06 99645->99646 99648 747ef9 99645->99648 99647 760ff6 Mailbox 59 API calls 99646->99647 99647->99648 99648->99588 99650 7434d4 99649->99650 99654 7434f3 _memmove 99649->99654 99652 760ff6 Mailbox 59 API calls 99650->99652 99651 760ff6 Mailbox 59 API calls 99653 74350a 99651->99653 99652->99654 99653->99608 99654->99651 99655->99605 99657 77e847 99656->99657 99658 746c15 99656->99658 99847 79fcb1 89 API calls 4 library calls 99657->99847 99761 745906 60 API calls Mailbox 99658->99761 99661 746c37 99762 745956 99661->99762 99662 77e85a 99848 79fcb1 89 API calls 4 library calls 99662->99848 99665 746c54 99667 7477c7 59 API calls 99665->99667 99669 746c60 99667->99669 99668 77e876 99671 746cc1 99668->99671 99775 760b9b 60 API calls __ftell_nolock 99669->99775 99673 746ccf 99671->99673 99674 77e889 99671->99674 99672 746c6c 99676 7477c7 59 API calls 99672->99676 99675 7477c7 59 API calls 99673->99675 99677 745dcf CloseHandle 99674->99677 99679 746cd8 99675->99679 99680 746c78 99676->99680 99678 77e895 99677->99678 99681 744f3d 136 API calls 99678->99681 99682 7477c7 59 API calls 99679->99682 99683 7448ae 60 API calls 99680->99683 99684 77e8b1 99681->99684 99685 746ce1 99682->99685 99686 746c86 99683->99686 99687 77e8da 99684->99687 99690 7a97e5 122 API calls 99684->99690 99785 7446f9 99685->99785 99776 7459b0 ReadFile SetFilePointerEx 99686->99776 99849 79fcb1 89 API calls 4 library calls 99687->99849 99694 77e8cd 99690->99694 99691 746cf8 99695 747c8e 59 API calls 99691->99695 99693 746cb2 99777 745c4e 99693->99777 99698 77e8f6 99694->99698 99699 77e8d5 99694->99699 99700 746d09 SetCurrentDirectoryW 99695->99700 99696 77e8f1 99704 746e6c Mailbox 99696->99704 99702 744faa 84 API calls 99698->99702 99701 744faa 84 API calls 99699->99701 99706 746d1c Mailbox 99700->99706 99701->99687 99703 77e8fb 99702->99703 99705 760ff6 Mailbox 59 API calls 99703->99705 99756 745934 99704->99756 99712 77e92f 99705->99712 99709 743bcd 99709->98352 99709->98376 99850 74766f 59 API calls 2 library calls 99712->99850 99718 77eb69 99856 7a7581 59 API calls Mailbox 99718->99856 99722 77eb8b 99857 7af835 59 API calls 2 library calls 99722->99857 99725 77eb98 99727 762f95 _free 58 API calls 99725->99727 99727->99704 99739 747f41 59 API calls 99745 77e978 Mailbox 99739->99745 99742 77ebbb 99858 79fcb1 89 API calls 4 library calls 99742->99858 99745->99718 99745->99739 99745->99742 99851 79fc4d 59 API calls 2 library calls 99745->99851 99852 79fb6e 61 API calls 2 library calls 99745->99852 99853 7a7621 59 API calls Mailbox 99745->99853 99854 74766f 59 API calls 2 library calls 99745->99854 99855 747373 59 API calls Mailbox 99745->99855 99746 77ebd4 99747 762f95 _free 58 API calls 99746->99747 99748 77ebe7 99747->99748 99748->99704 99749->99627 99750->99632 99751->99632 99752->99632 99753->99632 99754->99632 99755->99636 99757 745dcf CloseHandle 99756->99757 99758 74593c Mailbox 99757->99758 99759 745dcf CloseHandle 99758->99759 99760 74594b 99759->99760 99760->99709 99761->99661 99763 745dcf CloseHandle 99762->99763 99764 745962 99763->99764 99861 745df9 99764->99861 99766 7459a4 99766->99662 99766->99665 99767 745981 99767->99766 99869 745770 99767->99869 99769 745993 99886 7453db SetFilePointerEx SetFilePointerEx 99769->99886 99771 74599a 99771->99766 99772 77e030 99771->99772 99887 7a3696 SetFilePointerEx SetFilePointerEx WriteFile 99772->99887 99774 77e060 99774->99766 99775->99672 99776->99693 99784 745c68 99777->99784 99778 77e151 99901 745dae SetFilePointerEx 99778->99901 99779 745cef SetFilePointerEx 99900 745dae SetFilePointerEx 99779->99900 99782 77e16b 99783 745cc3 99783->99671 99784->99778 99784->99779 99784->99783 99786 7477c7 59 API calls 99785->99786 99787 74470f 99786->99787 99788 7477c7 59 API calls 99787->99788 99789 744717 99788->99789 99790 7477c7 59 API calls 99789->99790 99791 74471f 99790->99791 99792 7477c7 59 API calls 99791->99792 99793 744727 99792->99793 99794 77d8fb 99793->99794 99795 74475b 99793->99795 99796 7481a7 59 API calls 99794->99796 99797 7479ab 59 API calls 99795->99797 99798 77d904 99796->99798 99799 744769 99797->99799 99800 747eec 59 API calls 99798->99800 99801 747e8c 59 API calls 99799->99801 99804 74479e 99800->99804 99802 744773 99801->99802 99802->99804 99805 7479ab 59 API calls 99802->99805 99803 7447de 99902 7479ab 99803->99902 99804->99803 99806 7447bd 99804->99806 99818 77d924 99804->99818 99807 744794 99805->99807 99811 747b52 59 API calls 99806->99811 99810 747e8c 59 API calls 99807->99810 99809 77d9f4 99813 747d2c 59 API calls 99809->99813 99810->99804 99814 7447c7 99811->99814 99812 7447ef 99815 744801 99812->99815 99816 7481a7 59 API calls 99812->99816 99831 77d9b1 99813->99831 99814->99803 99822 7479ab 59 API calls 99814->99822 99817 744811 99815->99817 99819 7481a7 59 API calls 99815->99819 99816->99815 99821 744818 99817->99821 99823 7481a7 59 API calls 99817->99823 99818->99809 99820 77d9dd 99818->99820 99830 77d95b 99818->99830 99819->99817 99820->99809 99826 77d9c8 99820->99826 99824 7481a7 59 API calls 99821->99824 99833 74481f Mailbox 99821->99833 99822->99803 99823->99821 99824->99833 99825 747b52 59 API calls 99825->99831 99829 747d2c 59 API calls 99826->99829 99827 77d9b9 99828 747d2c 59 API calls 99827->99828 99828->99831 99829->99831 99830->99827 99834 77d9a4 99830->99834 99831->99803 99831->99825 99915 747a84 59 API calls 2 library calls 99831->99915 99833->99691 99835 747d2c 59 API calls 99834->99835 99835->99831 99847->99662 99848->99668 99849->99696 99850->99745 99851->99745 99852->99745 99853->99745 99854->99745 99855->99745 99856->99722 99857->99725 99858->99746 99862 77e181 99861->99862 99863 745e12 CreateFileW 99861->99863 99864 745e34 99862->99864 99865 77e187 CreateFileW 99862->99865 99863->99864 99864->99767 99865->99864 99866 77e1ad 99865->99866 99867 745c4e 2 API calls 99866->99867 99868 77e1b8 99867->99868 99868->99864 99870 77dfce 99869->99870 99871 74578b 99869->99871 99885 74581a 99870->99885 99894 745e3f 99870->99894 99872 745c4e 2 API calls 99871->99872 99871->99885 99873 7457ad 99872->99873 99874 74538e 59 API calls 99873->99874 99876 7457b7 99874->99876 99876->99870 99877 7457c4 99876->99877 99878 760ff6 Mailbox 59 API calls 99877->99878 99879 7457cf 99878->99879 99880 74538e 59 API calls 99879->99880 99881 7457da 99880->99881 99888 745d20 99881->99888 99883 745807 99884 745c4e 2 API calls 99883->99884 99884->99885 99885->99769 99886->99771 99887->99774 99889 745d93 99888->99889 99893 745d2e 99888->99893 99899 745dae SetFilePointerEx 99889->99899 99891 745d56 99891->99883 99892 745d66 ReadFile 99892->99891 99892->99893 99893->99891 99893->99892 99895 745c4e 2 API calls 99894->99895 99896 745e60 99895->99896 99897 745c4e 2 API calls 99896->99897 99898 745e74 99897->99898 99898->99885 99899->99893 99900->99783 99901->99782 99903 747a17 99902->99903 99904 7479ba 99902->99904 99906 747e8c 59 API calls 99903->99906 99904->99903 99905 7479c5 99904->99905 99907 7479e0 99905->99907 99908 77ef32 99905->99908 99911 7479e8 _memmove 99906->99911 99916 748087 59 API calls Mailbox 99907->99916 99910 748189 59 API calls 99908->99910 99912 77ef3c 99910->99912 99911->99812 99913 760ff6 Mailbox 59 API calls 99912->99913 99914 77ef5c 99913->99914 99915->99831 99916->99911 99918 746ef5 99917->99918 99922 747009 99917->99922 99919 760ff6 Mailbox 59 API calls 99918->99919 99918->99922 99921 746f1c 99919->99921 99920 760ff6 Mailbox 59 API calls 99926 746f91 99920->99926 99921->99920 99922->98491 99926->99922 99930 7463a0 99926->99930 99956 7474bd 59 API calls Mailbox 99926->99956 99957 796ac9 59 API calls Mailbox 99926->99957 99958 74766f 59 API calls 2 library calls 99926->99958 99928->98493 99929->98495 99959 747b76 99930->99959 99948 7463c5 99956->99926 99957->99926 99958->99926 99960 760ff6 Mailbox 59 API calls 99959->99960 99961 747b9b 99960->99961 99962 748189 59 API calls 99961->99962 99963 747baa 99962->99963 99963->99948 99972->98509 99973->98510 100526 743633 100527 74366a 100526->100527 100528 7436e7 100527->100528 100529 743688 100527->100529 100566 7436e5 100527->100566 100533 7436ed 100528->100533 100534 77d31c 100528->100534 100530 743695 100529->100530 100531 74375d PostQuitMessage 100529->100531 100535 7436a0 100530->100535 100536 77d38f 100530->100536 100538 7436d8 100531->100538 100532 7436ca DefWindowProcW 100532->100538 100539 743715 SetTimer RegisterWindowMessageW 100533->100539 100540 7436f2 100533->100540 100576 7511d0 10 API calls Mailbox 100534->100576 100541 743767 100535->100541 100542 7436a8 100535->100542 100580 7a2a16 71 API calls _memset 100536->100580 100539->100538 100543 74373e CreatePopupMenu 100539->100543 100546 77d2bf 100540->100546 100547 7436f9 KillTimer 100540->100547 100574 744531 64 API calls _memset 100541->100574 100548 77d374 100542->100548 100549 7436b3 100542->100549 100543->100538 100545 77d343 100577 7511f3 341 API calls Mailbox 100545->100577 100553 77d2c4 100546->100553 100554 77d2f8 MoveWindow 100546->100554 100571 7444cb Shell_NotifyIconW _memset 100547->100571 100548->100532 100579 79817e 59 API calls Mailbox 100548->100579 100556 7436be 100549->100556 100557 74374b 100549->100557 100550 77d3a1 100550->100532 100550->100538 100559 77d2e7 SetFocus 100553->100559 100560 77d2c8 100553->100560 100554->100538 100556->100532 100578 7444cb Shell_NotifyIconW _memset 100556->100578 100573 7445df 81 API calls _memset 100557->100573 100558 74375b 100558->100538 100559->100538 100560->100556 100564 77d2d1 100560->100564 100561 74370c 100572 743114 DeleteObject DestroyWindow Mailbox 100561->100572 100575 7511d0 10 API calls Mailbox 100564->100575 100566->100532 100569 77d368 100570 7443db 68 API calls 100569->100570 100570->100566 100571->100561 100572->100538 100573->100558 100574->100558 100575->100538 100576->100545 100577->100556 100578->100569 100579->100566 100580->100550 100581 74107d 100586 7471eb 100581->100586 100583 74108c 100584 762f80 __cinit 67 API calls 100583->100584 100585 741096 100584->100585 100587 7471fb __ftell_nolock 100586->100587 100588 7477c7 59 API calls 100587->100588 100589 7472b1 100588->100589 100590 744864 61 API calls 100589->100590 100591 7472ba 100590->100591 100617 76074f 100591->100617 100594 747e0b 59 API calls 100595 7472d3 100594->100595 100596 743f84 59 API calls 100595->100596 100597 7472e2 100596->100597 100598 7477c7 59 API calls 100597->100598 100599 7472eb 100598->100599 100600 747eec 59 API calls 100599->100600 100601 7472f4 RegOpenKeyExW 100600->100601 100602 77ecda RegQueryValueExW 100601->100602 100607 747316 Mailbox 100601->100607 100603 77ecf7 100602->100603 100604 77ed6c RegCloseKey 100602->100604 100605 760ff6 Mailbox 59 API calls 100603->100605 100604->100607 100616 77ed7e _wcscat Mailbox __NMSG_WRITE 100604->100616 100606 77ed10 100605->100606 100609 74538e 59 API calls 100606->100609 100607->100583 100608 747b52 59 API calls 100608->100616 100610 77ed1b RegQueryValueExW 100609->100610 100611 77ed38 100610->100611 100613 77ed52 100610->100613 100612 747d2c 59 API calls 100611->100612 100612->100613 100613->100604 100614 747f41 59 API calls 100614->100616 100615 743f84 59 API calls 100615->100616 100616->100607 100616->100608 100616->100614 100616->100615 100618 771b90 __ftell_nolock 100617->100618 100619 76075c GetFullPathNameW 100618->100619 100620 76077e 100619->100620 100621 747d2c 59 API calls 100620->100621 100622 7472c5 100621->100622 100622->100594 100623 1ff2410 100624 1ff0000 GetPEB 100623->100624 100625 1ff2514 100624->100625 100637 1ff2300 100625->100637 100638 1ff2309 Sleep 100637->100638 100639 1ff2317 100638->100639 100640 77ff06 100641 77ff10 100640->100641 100655 74ac90 Mailbox _memmove 100640->100655 100841 748e34 59 API calls Mailbox 100641->100841 100643 760ff6 59 API calls Mailbox 100643->100655 100646 760ff6 59 API calls Mailbox 100651 74a097 Mailbox 100646->100651 100647 74b5da 100851 7aa0b5 89 API calls 4 library calls 100647->100851 100649 74b5d5 100657 7481a7 59 API calls 100649->100657 100650 74a1b7 100651->100646 100651->100647 100651->100649 100651->100650 100658 78047f 100651->100658 100662 7481a7 59 API calls 100651->100662 100663 7477c7 59 API calls 100651->100663 100665 797405 59 API calls 100651->100665 100668 780e00 100651->100668 100670 762f80 67 API calls __cinit 100651->100670 100672 74a6ba 100651->100672 100835 74ca20 341 API calls 2 library calls 100651->100835 100836 74ba60 60 API calls Mailbox 100651->100836 100653 74b685 100846 7aa0b5 89 API calls 4 library calls 100653->100846 100655->100643 100655->100650 100655->100651 100655->100653 100661 747f41 59 API calls 100655->100661 100671 7bbf80 341 API calls 100655->100671 100674 74b416 100655->100674 100676 74a000 341 API calls 100655->100676 100677 780c94 100655->100677 100679 780ca2 100655->100679 100682 74b37c 100655->100682 100689 74ade2 Mailbox 100655->100689 100794 7bc5f4 100655->100794 100826 7a7be0 100655->100826 100832 7966f4 100655->100832 100842 797405 59 API calls 100655->100842 100843 7bc4a7 85 API calls 2 library calls 100655->100843 100657->100650 100845 7aa0b5 89 API calls 4 library calls 100658->100845 100661->100655 100662->100651 100663->100651 100664 78048e 100665->100651 100667 7966f4 Mailbox 59 API calls 100667->100650 100850 7aa0b5 89 API calls 4 library calls 100668->100850 100670->100651 100671->100655 100849 7aa0b5 89 API calls 4 library calls 100672->100849 100840 74f803 341 API calls 100674->100840 100676->100655 100847 749df0 59 API calls Mailbox 100677->100847 100848 7aa0b5 89 API calls 4 library calls 100679->100848 100681 780c86 100681->100650 100681->100667 100838 749e9c 60 API calls Mailbox 100682->100838 100684 74b38d 100839 749e9c 60 API calls Mailbox 100684->100839 100689->100650 100689->100653 100689->100681 100690 7800e0 VariantClear 100689->100690 100695 7b474d 100689->100695 100704 7ad2e6 100689->100704 100751 752123 100689->100751 100791 7be237 100689->100791 100837 749df0 59 API calls Mailbox 100689->100837 100844 797405 59 API calls 100689->100844 100690->100689 100696 749997 84 API calls 100695->100696 100697 7b4787 100696->100697 100698 7463a0 94 API calls 100697->100698 100699 7b4797 100698->100699 100700 7b47bc 100699->100700 100701 74a000 341 API calls 100699->100701 100703 7b47c0 100700->100703 100852 749bf8 100700->100852 100701->100700 100703->100689 100705 7ad310 100704->100705 100706 7ad305 100704->100706 100710 7477c7 59 API calls 100705->100710 100746 7ad3ea Mailbox 100705->100746 100707 749c9c 59 API calls 100706->100707 100707->100705 100708 760ff6 Mailbox 59 API calls 100709 7ad433 100708->100709 100711 7ad43f 100709->100711 100866 745906 60 API calls Mailbox 100709->100866 100712 7ad334 100710->100712 100716 749997 84 API calls 100711->100716 100714 7477c7 59 API calls 100712->100714 100715 7ad33d 100714->100715 100717 749997 84 API calls 100715->100717 100718 7ad457 100716->100718 100720 7ad349 100717->100720 100719 745956 67 API calls 100718->100719 100721 7ad466 100719->100721 100722 7446f9 59 API calls 100720->100722 100723 7ad46a GetLastError 100721->100723 100724 7ad49e 100721->100724 100725 7ad35e 100722->100725 100726 7ad483 100723->100726 100729 7ad4c9 100724->100729 100730 7ad500 100724->100730 100727 747c8e 59 API calls 100725->100727 100748 7ad3f3 Mailbox 100726->100748 100867 745a1a CloseHandle 100726->100867 100728 7ad391 100727->100728 100732 7ad3e3 100728->100732 100737 7a3e73 3 API calls 100728->100737 100731 760ff6 Mailbox 59 API calls 100729->100731 100733 760ff6 Mailbox 59 API calls 100730->100733 100734 7ad4ce 100731->100734 100736 749c9c 59 API calls 100732->100736 100738 7ad505 100733->100738 100739 7ad4df 100734->100739 100741 7477c7 59 API calls 100734->100741 100736->100746 100740 7ad3a1 100737->100740 100743 7477c7 59 API calls 100738->100743 100738->100748 100868 7af835 59 API calls 2 library calls 100739->100868 100740->100732 100742 7ad3a5 100740->100742 100741->100739 100745 747f41 59 API calls 100742->100745 100743->100748 100747 7ad3b2 100745->100747 100746->100708 100746->100748 100865 7a3c66 63 API calls Mailbox 100747->100865 100748->100689 100750 7ad3bb Mailbox 100750->100732 100752 749bf8 59 API calls 100751->100752 100753 75213b 100752->100753 100754 7869af 100753->100754 100756 760ff6 Mailbox 59 API calls 100753->100756 100758 752189 100754->100758 100888 7af7df 59 API calls 100754->100888 100757 752154 100756->100757 100759 752164 100757->100759 100884 745906 60 API calls Mailbox 100757->100884 100762 749c9c 59 API calls 100758->100762 100766 752196 100758->100766 100761 749997 84 API calls 100759->100761 100763 752172 100761->100763 100764 7869f7 100762->100764 100765 745956 67 API calls 100763->100765 100764->100766 100767 7869ff 100764->100767 100768 752181 100765->100768 100769 745e3f 2 API calls 100766->100769 100770 749c9c 59 API calls 100767->100770 100768->100754 100768->100758 100887 745a1a CloseHandle 100768->100887 100772 75219d 100769->100772 100770->100772 100773 7521b7 100772->100773 100774 786a11 100772->100774 100775 7477c7 59 API calls 100773->100775 100776 760ff6 Mailbox 59 API calls 100774->100776 100777 7521bf 100775->100777 100778 786a17 100776->100778 100869 7456d2 100777->100869 100780 786a2b 100778->100780 100889 7459b0 ReadFile SetFilePointerEx 100778->100889 100785 786a2f _memmove 100780->100785 100890 7a794e 59 API calls 2 library calls 100780->100890 100783 7521ce 100783->100785 100885 749b9c 59 API calls Mailbox 100783->100885 100786 7521e2 Mailbox 100787 75221c 100786->100787 100788 745dcf CloseHandle 100786->100788 100787->100689 100789 752210 100788->100789 100789->100787 100886 745a1a CloseHandle 100789->100886 100792 7bcdf1 130 API calls 100791->100792 100793 7be247 100792->100793 100793->100689 100795 7477c7 59 API calls 100794->100795 100796 7bc608 100795->100796 100797 7477c7 59 API calls 100796->100797 100798 7bc610 100797->100798 100799 7477c7 59 API calls 100798->100799 100800 7bc618 100799->100800 100801 749997 84 API calls 100800->100801 100815 7bc626 100801->100815 100802 747d2c 59 API calls 100802->100815 100803 7bc80f 100804 7bc83c Mailbox 100803->100804 100941 749b9c 59 API calls Mailbox 100803->100941 100804->100655 100805 7bc7f6 100808 747e0b 59 API calls 100805->100808 100807 7bc811 100810 747e0b 59 API calls 100807->100810 100812 7bc803 100808->100812 100809 747a84 59 API calls 100809->100815 100814 7bc820 100810->100814 100811 7481a7 59 API calls 100811->100815 100813 747c8e 59 API calls 100812->100813 100813->100803 100817 747c8e 59 API calls 100814->100817 100815->100802 100815->100803 100815->100804 100815->100805 100815->100807 100815->100809 100815->100811 100816 747faf 59 API calls 100815->100816 100818 747faf 59 API calls 100815->100818 100823 749997 84 API calls 100815->100823 100824 747e0b 59 API calls 100815->100824 100825 747c8e 59 API calls 100815->100825 100819 7bc6bd CharUpperBuffW 100816->100819 100817->100803 100820 7bc77d CharUpperBuffW 100818->100820 100928 74859a 68 API calls 100819->100928 100929 74c707 100820->100929 100823->100815 100824->100815 100825->100815 100827 7a7bec 100826->100827 100828 760ff6 Mailbox 59 API calls 100827->100828 100829 7a7bfa 100828->100829 100830 7a7c08 100829->100830 100831 7477c7 59 API calls 100829->100831 100830->100655 100831->100830 100944 796636 100832->100944 100834 796702 100834->100655 100835->100651 100836->100651 100837->100689 100838->100684 100839->100674 100840->100653 100841->100655 100842->100655 100843->100655 100844->100689 100845->100664 100846->100681 100847->100681 100848->100681 100849->100650 100850->100647 100851->100650 100853 77fbff 100852->100853 100856 749c08 100852->100856 100854 747d2c 59 API calls 100853->100854 100857 77fc10 100853->100857 100854->100857 100855 747eec 59 API calls 100858 77fc1a 100855->100858 100859 760ff6 Mailbox 59 API calls 100856->100859 100857->100855 100862 749c34 100858->100862 100863 7477c7 59 API calls 100858->100863 100860 749c1b 100859->100860 100860->100858 100861 749c26 100860->100861 100861->100862 100864 747f41 59 API calls 100861->100864 100862->100703 100863->100862 100864->100862 100865->100750 100866->100711 100867->100748 100868->100748 100870 745702 100869->100870 100871 7456dd 100869->100871 100872 747eec 59 API calls 100870->100872 100871->100870 100874 7456ec 100871->100874 100873 7a349a 100872->100873 100877 7a34c9 100873->100877 100891 7a3436 ReadFile SetFilePointerEx 100873->100891 100892 747a84 59 API calls 2 library calls 100873->100892 100893 745c18 100874->100893 100877->100783 100883 7a35d8 Mailbox 100883->100783 100884->100759 100885->100786 100886->100787 100887->100754 100888->100754 100889->100780 100890->100785 100891->100873 100892->100873 100894 760ff6 Mailbox 59 API calls 100893->100894 100895 745c2b 100894->100895 100896 760ff6 Mailbox 59 API calls 100895->100896 100897 745c37 100896->100897 100898 745632 100897->100898 100905 745a2f 100898->100905 100900 745674 100900->100883 100904 74793a 61 API calls Mailbox 100900->100904 100901 745d20 2 API calls 100902 745643 100901->100902 100902->100900 100902->100901 100912 745bda 100902->100912 100904->100883 100906 77e065 100905->100906 100907 745a40 100905->100907 100921 796443 59 API calls Mailbox 100906->100921 100907->100902 100909 77e06f 100910 760ff6 Mailbox 59 API calls 100909->100910 100911 77e07b 100910->100911 100913 77e117 100912->100913 100914 745bee 100912->100914 100927 796443 59 API calls Mailbox 100913->100927 100922 745b19 100914->100922 100917 745bfa 100917->100902 100918 77e122 100919 760ff6 Mailbox 59 API calls 100918->100919 100920 77e137 _memmove 100919->100920 100921->100909 100923 745b31 100922->100923 100926 745b2a _memmove 100922->100926 100924 760ff6 Mailbox 59 API calls 100923->100924 100925 77e0a7 100923->100925 100924->100926 100925->100925 100926->100917 100927->100918 100928->100815 100930 747b76 59 API calls 100929->100930 100931 74c72c _wcscmp 100929->100931 100930->100931 100932 747f41 59 API calls 100931->100932 100934 74c760 Mailbox 100931->100934 100933 781abb 100932->100933 100935 747c8e 59 API calls 100933->100935 100934->100815 100936 781ac6 100935->100936 100942 74859a 68 API calls 100936->100942 100938 781ad7 100940 781adb Mailbox 100938->100940 100943 749e9c 60 API calls Mailbox 100938->100943 100940->100815 100941->100804 100942->100938 100943->100940 100945 79665e 100944->100945 100946 796641 100944->100946 100945->100834 100946->100945 100948 796621 59 API calls Mailbox 100946->100948 100948->100946 100949 741066 100954 74f8cf 100949->100954 100951 74106c 100952 762f80 __cinit 67 API calls 100951->100952 100953 741076 100952->100953 100955 74f8f0 100954->100955 100987 760143 100955->100987 100959 74f937 100960 7477c7 59 API calls 100959->100960 100961 74f941 100960->100961 100962 7477c7 59 API calls 100961->100962 100963 74f94b 100962->100963 100964 7477c7 59 API calls 100963->100964 100965 74f955 100964->100965 100966 7477c7 59 API calls 100965->100966 100967 74f993 100966->100967 100968 7477c7 59 API calls 100967->100968 100969 74fa5e 100968->100969 100997 7560e7 100969->100997 100973 74fa90 100974 7477c7 59 API calls 100973->100974 100975 74fa9a 100974->100975 101025 75ffde 100975->101025 100977 74fae1 100978 74faf1 GetStdHandle 100977->100978 100979 74fb3d 100978->100979 100980 7849d5 100978->100980 100981 74fb45 OleInitialize 100979->100981 100980->100979 100982 7849de 100980->100982 100981->100951 101032 7a6dda 64 API calls Mailbox 100982->101032 100984 7849e5 101033 7a74a9 CreateThread 100984->101033 100986 7849f1 CloseHandle 100986->100981 101034 76021c 100987->101034 100990 76021c 59 API calls 100991 760185 100990->100991 100992 7477c7 59 API calls 100991->100992 100993 760191 100992->100993 100994 747d2c 59 API calls 100993->100994 100995 74f8f6 100994->100995 100996 7603a2 6 API calls 100995->100996 100996->100959 100998 7477c7 59 API calls 100997->100998 100999 7560f7 100998->100999 101000 7477c7 59 API calls 100999->101000 101001 7560ff 101000->101001 101041 755bfd 101001->101041 101004 755bfd 59 API calls 101005 75610f 101004->101005 101006 7477c7 59 API calls 101005->101006 101007 75611a 101006->101007 101008 760ff6 Mailbox 59 API calls 101007->101008 101009 74fa68 101008->101009 101010 756259 101009->101010 101011 756267 101010->101011 101012 7477c7 59 API calls 101011->101012 101013 756272 101012->101013 101014 7477c7 59 API calls 101013->101014 101015 75627d 101014->101015 101016 7477c7 59 API calls 101015->101016 101017 756288 101016->101017 101018 7477c7 59 API calls 101017->101018 101019 756293 101018->101019 101020 755bfd 59 API calls 101019->101020 101021 75629e 101020->101021 101022 760ff6 Mailbox 59 API calls 101021->101022 101023 7562a5 RegisterWindowMessageW 101022->101023 101023->100973 101026 795cc3 101025->101026 101027 75ffee 101025->101027 101044 7a9d71 60 API calls 101026->101044 101028 760ff6 Mailbox 59 API calls 101027->101028 101031 75fff6 101028->101031 101030 795cce 101031->100977 101032->100984 101033->100986 101045 7a748f 65 API calls 101033->101045 101035 7477c7 59 API calls 101034->101035 101036 760227 101035->101036 101037 7477c7 59 API calls 101036->101037 101038 76022f 101037->101038 101039 7477c7 59 API calls 101038->101039 101040 76017b 101039->101040 101040->100990 101042 7477c7 59 API calls 101041->101042 101043 755c05 101042->101043 101043->101004 101044->101030 101046 74b56e 101053 75fb84 101046->101053 101048 74b584 101049 74c707 69 API calls 101048->101049 101050 74b5ac 101049->101050 101052 74a4e8 101050->101052 101062 7aa0b5 89 API calls 4 library calls 101050->101062 101054 75fb90 101053->101054 101055 75fba2 101053->101055 101063 749e9c 60 API calls Mailbox 101054->101063 101056 75fbd1 101055->101056 101057 75fba8 101055->101057 101064 749e9c 60 API calls Mailbox 101056->101064 101059 760ff6 Mailbox 59 API calls 101057->101059 101061 75fb9a 101059->101061 101061->101048 101062->101052 101063->101061 101064->101061 101065 780226 101071 74ade2 Mailbox 101065->101071 101067 780c86 101068 7966f4 Mailbox 59 API calls 101067->101068 101069 780c8f 101068->101069 101071->101067 101071->101069 101072 7800e0 VariantClear 101071->101072 101073 74b6c1 101071->101073 101075 7b474d 341 API calls 101071->101075 101076 752123 95 API calls 101071->101076 101077 7ad2e6 101 API calls 101071->101077 101078 7be237 130 API calls 101071->101078 101079 749df0 59 API calls Mailbox 101071->101079 101080 797405 59 API calls 101071->101080 101072->101071 101081 7aa0b5 89 API calls 4 library calls 101073->101081 101075->101071 101076->101071 101077->101071 101078->101071 101079->101071 101080->101071 101081->101067 101082 74568a 101083 745c18 59 API calls 101082->101083 101084 74569c 101083->101084 101085 745632 61 API calls 101084->101085 101086 7456aa 101085->101086 101088 7456ba Mailbox 101086->101088 101089 7481c1 61 API calls Mailbox 101086->101089 101089->101088 101090 74e70b 101093 74d260 101090->101093 101092 74e719 101094 74d27d 101093->101094 101122 74d4dd 101093->101122 101095 782b0a 101094->101095 101096 782abb 101094->101096 101125 74d2a4 101094->101125 101137 7ba6fb 341 API calls __cinit 101095->101137 101099 782abe 101096->101099 101107 782ad9 101096->101107 101100 782aca 101099->101100 101099->101125 101135 7bad0f 341 API calls 101100->101135 101101 762f80 __cinit 67 API calls 101101->101125 101104 74d594 101129 748bb2 68 API calls 101104->101129 101105 782cdf 101105->101105 101106 74d6ab 101106->101092 101107->101122 101136 7bb1b7 341 API calls 3 library calls 101107->101136 101111 74d5a3 101111->101092 101112 782c26 101141 7baa66 89 API calls 101112->101141 101115 748620 69 API calls 101115->101125 101122->101106 101142 7aa0b5 89 API calls 4 library calls 101122->101142 101123 74a000 341 API calls 101123->101125 101124 7481a7 59 API calls 101124->101125 101125->101101 101125->101104 101125->101106 101125->101112 101125->101115 101125->101122 101125->101123 101125->101124 101127 7488a0 68 API calls __cinit 101125->101127 101128 7486a2 68 API calls 101125->101128 101130 74859a 68 API calls 101125->101130 101131 74d0dc 341 API calls 101125->101131 101132 749f3a 59 API calls Mailbox 101125->101132 101133 74d060 89 API calls 101125->101133 101134 74cedd 341 API calls 101125->101134 101138 748bb2 68 API calls 101125->101138 101139 749e9c 60 API calls Mailbox 101125->101139 101140 796d03 60 API calls 101125->101140 101127->101125 101128->101125 101129->101111 101130->101125 101131->101125 101132->101125 101133->101125 101134->101125 101135->101106 101136->101122 101137->101125 101138->101125 101139->101125 101140->101125 101141->101122 101142->101105

                            Control-flow Graph

                            APIs
                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00743B7A
                            • IsDebuggerPresent.KERNEL32 ref: 00743B8C
                            • GetFullPathNameW.KERNEL32(00007FFF,?,?,008062F8,008062E0,?,?), ref: 00743BFD
                              • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                              • Part of subcall function 00750A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00743C26,008062F8,?,?,?), ref: 00750ACE
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00743C81
                            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,007F93F0,00000010), ref: 0077D4BC
                            • SetCurrentDirectoryW.KERNEL32(?,008062F8,?,?,?), ref: 0077D4F4
                            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,007F5D40,008062F8,?,?,?), ref: 0077D57A
                            • ShellExecuteW.SHELL32(00000000,?,?), ref: 0077D581
                              • Part of subcall function 00743A58: GetSysColorBrush.USER32(0000000F), ref: 00743A62
                              • Part of subcall function 00743A58: LoadCursorW.USER32(00000000,00007F00), ref: 00743A71
                              • Part of subcall function 00743A58: LoadIconW.USER32(00000063), ref: 00743A88
                              • Part of subcall function 00743A58: LoadIconW.USER32(000000A4), ref: 00743A9A
                              • Part of subcall function 00743A58: LoadIconW.USER32(000000A2), ref: 00743AAC
                              • Part of subcall function 00743A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00743AD2
                              • Part of subcall function 00743A58: RegisterClassExW.USER32(?), ref: 00743B28
                              • Part of subcall function 007439E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00743A15
                              • Part of subcall function 007439E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00743A36
                              • Part of subcall function 007439E7: ShowWindow.USER32(00000000,?,?), ref: 00743A4A
                              • Part of subcall function 007439E7: ShowWindow.USER32(00000000,?,?), ref: 00743A53
                              • Part of subcall function 007443DB: _memset.LIBCMT ref: 00744401
                              • Part of subcall function 007443DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 007444A6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                            • String ID: This is a third-party compiled AutoIt script.$runas$%}
                            • API String ID: 529118366-2264255860
                            • Opcode ID: 7e14835cfcdcfc2e7a579936f11daaff6aec676524e7ae8ea389f43f6ca27455
                            • Instruction ID: 69d935ed5902447540f3962d049f6843374522d46ce3bf065d72ec20f2baea18
                            • Opcode Fuzzy Hash: 7e14835cfcdcfc2e7a579936f11daaff6aec676524e7ae8ea389f43f6ca27455
                            • Instruction Fuzzy Hash: 93510430E04289EBCF15ABB4DC49EFD7B79BF05340B008179F559A22A1EB7C5A25CB21

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 943 744fe9-745001 CreateStreamOnHGlobal 944 745021-745026 943->944 945 745003-74501a FindResourceExW 943->945 946 745020 945->946 947 77dd5c-77dd6b LoadResource 945->947 946->944 947->946 948 77dd71-77dd7f SizeofResource 947->948 948->946 949 77dd85-77dd90 LockResource 948->949 949->946 950 77dd96-77ddb4 949->950 950->946
                            APIs
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00744EEE,?,?,00000000,00000000), ref: 00744FF9
                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00744EEE,?,?,00000000,00000000), ref: 00745010
                            • LoadResource.KERNEL32(?,00000000,?,?,00744EEE,?,?,00000000,00000000,?,?,?,?,?,?,00744F8F), ref: 0077DD60
                            • SizeofResource.KERNEL32(?,00000000,?,?,00744EEE,?,?,00000000,00000000,?,?,?,?,?,?,00744F8F), ref: 0077DD75
                            • LockResource.KERNEL32(Nt,?,?,00744EEE,?,?,00000000,00000000,?,?,?,?,?,?,00744F8F,00000000), ref: 0077DD88
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                            • String ID: SCRIPT$Nt
                            • API String ID: 3051347437-3041533753
                            • Opcode ID: a465296f4f838737b42d08246db205527937550fd0ddf5496c9c9d9ca3dd0d50
                            • Instruction ID: 13358ad012285b9a18625587f3c002d5d12231de47802a5a939374fd36c2776f
                            • Opcode Fuzzy Hash: a465296f4f838737b42d08246db205527937550fd0ddf5496c9c9d9ca3dd0d50
                            • Instruction Fuzzy Hash: 16112A75240B01AFE7218B65DC58F6B7BBEEBC9B51F20816DF406D6260DB75EC008664

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1007 744afe-744b5e call 7477c7 GetVersionExW call 747d2c 1012 744b64 1007->1012 1013 744c69-744c6b 1007->1013 1015 744b67-744b6c 1012->1015 1014 77db90-77db9c 1013->1014 1016 77db9d-77dba1 1014->1016 1017 744c70-744c71 1015->1017 1018 744b72 1015->1018 1020 77dba4-77dbb0 1016->1020 1021 77dba3 1016->1021 1019 744b73-744baa call 747e8c call 747886 1017->1019 1018->1019 1029 744bb0-744bb1 1019->1029 1030 77dc8d-77dc90 1019->1030 1020->1016 1023 77dbb2-77dbb7 1020->1023 1021->1020 1023->1015 1025 77dbbd-77dbc4 1023->1025 1025->1014 1027 77dbc6 1025->1027 1031 77dbcb-77dbce 1027->1031 1029->1031 1032 744bb7-744bc2 1029->1032 1033 77dc92 1030->1033 1034 77dca9-77dcad 1030->1034 1035 77dbd4-77dbf2 1031->1035 1036 744bf1-744c08 GetCurrentProcess IsWow64Process 1031->1036 1037 77dc13-77dc19 1032->1037 1038 744bc8-744bca 1032->1038 1039 77dc95 1033->1039 1041 77dcaf-77dcb8 1034->1041 1042 77dc98-77dca1 1034->1042 1035->1036 1040 77dbf8-77dbfe 1035->1040 1043 744c0d-744c1e 1036->1043 1044 744c0a 1036->1044 1049 77dc23-77dc29 1037->1049 1050 77dc1b-77dc1e 1037->1050 1045 744bd0-744bd3 1038->1045 1046 77dc2e-77dc3a 1038->1046 1039->1042 1047 77dc00-77dc03 1040->1047 1048 77dc08-77dc0e 1040->1048 1041->1039 1051 77dcba-77dcbd 1041->1051 1042->1034 1052 744c20-744c30 call 744c95 1043->1052 1053 744c89-744c93 GetSystemInfo 1043->1053 1044->1043 1054 77dc5a-77dc5d 1045->1054 1055 744bd9-744be8 1045->1055 1057 77dc44-77dc4a 1046->1057 1058 77dc3c-77dc3f 1046->1058 1047->1036 1048->1036 1049->1036 1050->1036 1051->1042 1064 744c32-744c3f call 744c95 1052->1064 1065 744c7d-744c87 GetSystemInfo 1052->1065 1056 744c56-744c66 1053->1056 1054->1036 1063 77dc63-77dc78 1054->1063 1060 77dc4f-77dc55 1055->1060 1061 744bee 1055->1061 1057->1036 1058->1036 1060->1036 1061->1036 1066 77dc82-77dc88 1063->1066 1067 77dc7a-77dc7d 1063->1067 1072 744c76-744c7b 1064->1072 1073 744c41-744c45 GetNativeSystemInfo 1064->1073 1068 744c47-744c4b 1065->1068 1066->1036 1067->1036 1068->1056 1070 744c4d-744c50 FreeLibrary 1068->1070 1070->1056 1072->1073 1073->1068
                            APIs
                            • GetVersionExW.KERNEL32(?), ref: 00744B2B
                              • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                            • GetCurrentProcess.KERNEL32(?,007CFAEC,00000000,00000000,?), ref: 00744BF8
                            • IsWow64Process.KERNEL32(00000000), ref: 00744BFF
                            • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00744C45
                            • FreeLibrary.KERNEL32(00000000), ref: 00744C50
                            • GetSystemInfo.KERNEL32(00000000), ref: 00744C81
                            • GetSystemInfo.KERNEL32(00000000), ref: 00744C8D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                            • String ID:
                            • API String ID: 1986165174-0
                            • Opcode ID: 7692c4378464b0da73273d14596bd70f1b142e92881fcc8f064ad8a21e5c46bd
                            • Instruction ID: 10cbe676721459d87373047ac4f01b39cd8d2ee8f05fed6a589c912b5bc8c416
                            • Opcode Fuzzy Hash: 7692c4378464b0da73273d14596bd70f1b142e92881fcc8f064ad8a21e5c46bd
                            • Instruction Fuzzy Hash: A291C67154A7C4DECB31CB6885956AAFFF5AF26300B488D5DD0CB93B01D328E908D769
                            APIs
                            • GetFileAttributesW.KERNELBASE(?,0077E7C1), ref: 007A46A6
                            • FindFirstFileW.KERNELBASE(?,?), ref: 007A46B7
                            • FindClose.KERNEL32(00000000), ref: 007A46C7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FileFind$AttributesCloseFirst
                            • String ID:
                            • API String ID: 48322524-0
                            • Opcode ID: 826ef002c82c3186c61a5773c36f3134571f1e65e99faa18eb6f62bb40c9b456
                            • Instruction ID: f674ef6779db58b5a22e050b4bc9135988719a27f62537e112c555cac30f325c
                            • Opcode Fuzzy Hash: 826ef002c82c3186c61a5773c36f3134571f1e65e99faa18eb6f62bb40c9b456
                            • Instruction Fuzzy Hash: 22E0DF328118006B8610A738EC4D8EE779DAE87335F10472AF835C20E0EBF89960869A
                            Strings
                            • Variable must be of type 'Object'., xrefs: 0078428C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID: Variable must be of type 'Object'.
                            • API String ID: 0-109567571
                            • Opcode ID: 5bc593ffed891db717dcd8079c8c74bf53d65c1f7089568ee52e5ded04fe7273
                            • Instruction ID: 7469734d9d32ad52d56f014ded4ad606308c72f3a8163e17b294c749cd978ee0
                            • Opcode Fuzzy Hash: 5bc593ffed891db717dcd8079c8c74bf53d65c1f7089568ee52e5ded04fe7273
                            • Instruction Fuzzy Hash: 8DA29F74E04216CFCB24DF58C484AAEB7B1FF58320F248169E916AB351D779ED82CB91
                            APIs
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00750BBB
                            • timeGetTime.WINMM ref: 00750E76
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00750FB3
                            • TranslateMessage.USER32(?), ref: 00750FC7
                            • DispatchMessageW.USER32(?), ref: 00750FD5
                            • Sleep.KERNEL32(0000000A), ref: 00750FDF
                            • LockWindowUpdate.USER32(00000000,?,?), ref: 0075105A
                            • DestroyWindow.USER32 ref: 00751066
                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00751080
                            • Sleep.KERNEL32(0000000A,?,?), ref: 007852AD
                            • TranslateMessage.USER32(?), ref: 0078608A
                            • DispatchMessageW.USER32(?), ref: 00786098
                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 007860AC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                            • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                            • API String ID: 4003667617-3242690629
                            • Opcode ID: 4b6710e76955c9deb841260becc01a841b4924e32d98b18d6b4555c7833eec85
                            • Instruction ID: cad893d6c8fc1e59ce021e52824f0c57b9cac84dcd2cd42d9cbe85846e4832de
                            • Opcode Fuzzy Hash: 4b6710e76955c9deb841260becc01a841b4924e32d98b18d6b4555c7833eec85
                            • Instruction Fuzzy Hash: 77B2E770608741DFD724EF24C889BAAB7E5FF84304F14891DF98997291DB79E848CB92

                            Control-flow Graph

                            APIs
                              • Part of subcall function 007A91E9: __time64.LIBCMT ref: 007A91F3
                              • Part of subcall function 00745045: _fseek.LIBCMT ref: 0074505D
                            • __wsplitpath.LIBCMT ref: 007A94BE
                              • Part of subcall function 0076432E: __wsplitpath_helper.LIBCMT ref: 0076436E
                            • _wcscpy.LIBCMT ref: 007A94D1
                            • _wcscat.LIBCMT ref: 007A94E4
                            • __wsplitpath.LIBCMT ref: 007A9509
                            • _wcscat.LIBCMT ref: 007A951F
                            • _wcscat.LIBCMT ref: 007A9532
                              • Part of subcall function 007A922F: _memmove.LIBCMT ref: 007A9268
                              • Part of subcall function 007A922F: _memmove.LIBCMT ref: 007A9277
                            • _wcscmp.LIBCMT ref: 007A9479
                              • Part of subcall function 007A99BE: _wcscmp.LIBCMT ref: 007A9AAE
                              • Part of subcall function 007A99BE: _wcscmp.LIBCMT ref: 007A9AC1
                            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007A96DC
                            • _wcsncpy.LIBCMT ref: 007A974F
                            • DeleteFileW.KERNEL32(?,?), ref: 007A9785
                            • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 007A979B
                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007A97AC
                            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007A97BE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                            • String ID:
                            • API String ID: 1500180987-0
                            • Opcode ID: 5a294e9ab222526dc210a631136c42054a03fdf347a4aa912416b9531eaba6aa
                            • Instruction ID: 3760712d934381beccdf1a82930bb58255e7ad8761d5e00b161f3682e3ccd538
                            • Opcode Fuzzy Hash: 5a294e9ab222526dc210a631136c42054a03fdf347a4aa912416b9531eaba6aa
                            • Instruction Fuzzy Hash: 34C13CB1E00229ABCF21DFA5CC85EDEB7BDAF85300F0041AAF609E7151DB349A548F65

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 00743074
                            • RegisterClassExW.USER32(00000030), ref: 0074309E
                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007430AF
                            • InitCommonControlsEx.COMCTL32(?), ref: 007430CC
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007430DC
                            • LoadIconW.USER32(000000A9), ref: 007430F2
                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00743101
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                            • API String ID: 2914291525-1005189915
                            • Opcode ID: e47f74b6de13e62510e318e4e62e55b8985d7797952bb7c0f114eb1840e8c7ae
                            • Instruction ID: 1beaa942d6e390566e02168e2e5c0b790b1e2e92c152b23420711b31abce1c3f
                            • Opcode Fuzzy Hash: e47f74b6de13e62510e318e4e62e55b8985d7797952bb7c0f114eb1840e8c7ae
                            • Instruction Fuzzy Hash: A4313AB1940305EFDB90DFA4DC48AC9BBF1FB09710F14852EE595E62A0E3B945A1CF94

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 00743074
                            • RegisterClassExW.USER32(00000030), ref: 0074309E
                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007430AF
                            • InitCommonControlsEx.COMCTL32(?), ref: 007430CC
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007430DC
                            • LoadIconW.USER32(000000A9), ref: 007430F2
                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00743101
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                            • API String ID: 2914291525-1005189915
                            • Opcode ID: 96e1e643aa9e6ae9ef7b71873f9f87a0c86174ff424079e5307076b81d739fba
                            • Instruction ID: 5c7c1010c55d7dafea66e2635c728a47ff93acfa15e8ec9573738d5b64115926
                            • Opcode Fuzzy Hash: 96e1e643aa9e6ae9ef7b71873f9f87a0c86174ff424079e5307076b81d739fba
                            • Instruction Fuzzy Hash: 3321C5B1901218AFDB40DFA4EC49B9DBBF5FB08710F00812AF911A62A0E7B545648F95

                            Control-flow Graph

                            APIs
                              • Part of subcall function 00744864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,008062F8,?,007437C0,?), ref: 00744882
                              • Part of subcall function 0076074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,007472C5), ref: 00760771
                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00747308
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0077ECF1
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0077ED32
                            • RegCloseKey.ADVAPI32(?), ref: 0077ED70
                            • _wcscat.LIBCMT ref: 0077EDC9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                            • API String ID: 2673923337-2727554177
                            • Opcode ID: 051e82be6f7f1d6fd318f888d901b618280db4f6748b87be464b2cfe90de4e67
                            • Instruction ID: 601acce1e08bd66fb9229e4009eafc918a67e0134dcb6b4617f12f8dbfb17e2e
                            • Opcode Fuzzy Hash: 051e82be6f7f1d6fd318f888d901b618280db4f6748b87be464b2cfe90de4e67
                            • Instruction Fuzzy Hash: 8B719E71909301DEC754EF25DC8999BBBE8FF58740F80492EF44AC31A1EB74A949CBA1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 761 743633-743681 763 7436e1-7436e3 761->763 764 743683-743686 761->764 763->764 765 7436e5 763->765 766 7436e7 764->766 767 743688-74368f 764->767 770 7436ca-7436d2 DefWindowProcW 765->770 771 7436ed-7436f0 766->771 772 77d31c-77d34a call 7511d0 call 7511f3 766->772 768 743695-74369a 767->768 769 74375d-743765 PostQuitMessage 767->769 773 7436a0-7436a2 768->773 774 77d38f-77d3a3 call 7a2a16 768->774 777 743711-743713 769->777 776 7436d8-7436de 770->776 778 743715-74373c SetTimer RegisterWindowMessageW 771->778 779 7436f2-7436f3 771->779 806 77d34f-77d356 772->806 780 743767-743776 call 744531 773->780 781 7436a8-7436ad 773->781 774->777 797 77d3a9 774->797 777->776 778->777 782 74373e-743749 CreatePopupMenu 778->782 785 77d2bf-77d2c2 779->785 786 7436f9-74370c KillTimer call 7444cb call 743114 779->786 780->777 787 77d374-77d37b 781->787 788 7436b3-7436b8 781->788 782->777 792 77d2c4-77d2c6 785->792 793 77d2f8-77d317 MoveWindow 785->793 786->777 787->770 803 77d381-77d38a call 79817e 787->803 795 7436be-7436c4 788->795 796 74374b-74375b call 7445df 788->796 800 77d2e7-77d2f3 SetFocus 792->800 801 77d2c8-77d2cb 792->801 793->777 795->770 795->806 796->777 797->770 800->777 801->795 807 77d2d1-77d2e2 call 7511d0 801->807 803->770 806->770 811 77d35c-77d36f call 7444cb call 7443db 806->811 807->777 811->770
                            APIs
                            • DefWindowProcW.USER32(?,?,?,?), ref: 007436D2
                            • KillTimer.USER32(?,00000001), ref: 007436FC
                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0074371F
                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0074372A
                            • CreatePopupMenu.USER32 ref: 0074373E
                            • PostQuitMessage.USER32(00000000), ref: 0074375F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                            • String ID: TaskbarCreated$%}
                            • API String ID: 129472671-1720201399
                            • Opcode ID: 561bd638921a263494221b79defa82214786d0743d70c3e4e0d6cc0b34e1d754
                            • Instruction ID: 31b827dc88978adccff11bdd360be09fee2cb5b59b5ae15a0d589d7f49279d52
                            • Opcode Fuzzy Hash: 561bd638921a263494221b79defa82214786d0743d70c3e4e0d6cc0b34e1d754
                            • Instruction Fuzzy Hash: D04136B1200106FBDF645F68DC4DB793765FB00340F144129FA0ED62A2EB6CAE349766

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 00743A62
                            • LoadCursorW.USER32(00000000,00007F00), ref: 00743A71
                            • LoadIconW.USER32(00000063), ref: 00743A88
                            • LoadIconW.USER32(000000A4), ref: 00743A9A
                            • LoadIconW.USER32(000000A2), ref: 00743AAC
                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00743AD2
                            • RegisterClassExW.USER32(?), ref: 00743B28
                              • Part of subcall function 00743041: GetSysColorBrush.USER32(0000000F), ref: 00743074
                              • Part of subcall function 00743041: RegisterClassExW.USER32(00000030), ref: 0074309E
                              • Part of subcall function 00743041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007430AF
                              • Part of subcall function 00743041: InitCommonControlsEx.COMCTL32(?), ref: 007430CC
                              • Part of subcall function 00743041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007430DC
                              • Part of subcall function 00743041: LoadIconW.USER32(000000A9), ref: 007430F2
                              • Part of subcall function 00743041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00743101
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                            • String ID: #$0$AutoIt v3
                            • API String ID: 423443420-4155596026
                            • Opcode ID: 76bfb3ca89d2e20e818ec84819450566bd4906cbcbda164a16854010f5861eaa
                            • Instruction ID: 15a2d722f1cbf5a425a7f7380d5154ca8614a76051f1ecaaee1e98688dc4a249
                            • Opcode Fuzzy Hash: 76bfb3ca89d2e20e818ec84819450566bd4906cbcbda164a16854010f5861eaa
                            • Instruction Fuzzy Hash: 9821F971A40304EFEB509FA4EC49F9D7BB6FB08721F10412AE504A62A0E7BA56649F94

                            Control-flow Graph

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                            • API String ID: 1825951767-3513169116
                            • Opcode ID: 9f0e3886b5d1914dd79e1b1deb65870e440b1dce3e6648339214afcc12409394
                            • Instruction ID: a5ae9d1b227cbf102a272d0c1290a17e676fe5c155b12f04804916f4863cb698
                            • Opcode Fuzzy Hash: 9f0e3886b5d1914dd79e1b1deb65870e440b1dce3e6648339214afcc12409394
                            • Instruction Fuzzy Hash: DEA13E7191022DDADF14EBA0CC9AEEEB778BF15300F444529F516B7192EF786A09CB60

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 953 1ff2690-1ff273e call 1ff0000 956 1ff2745-1ff276b call 1ff35a0 CreateFileW 953->956 959 1ff276d 956->959 960 1ff2772-1ff2782 956->960 961 1ff28bd-1ff28c1 959->961 965 1ff2789-1ff27a3 VirtualAlloc 960->965 966 1ff2784 960->966 962 1ff2903-1ff2906 961->962 963 1ff28c3-1ff28c7 961->963 967 1ff2909-1ff2910 962->967 968 1ff28c9-1ff28cc 963->968 969 1ff28d3-1ff28d7 963->969 970 1ff27aa-1ff27c1 ReadFile 965->970 971 1ff27a5 965->971 966->961 972 1ff2965-1ff297a 967->972 973 1ff2912-1ff291d 967->973 968->969 974 1ff28d9-1ff28e3 969->974 975 1ff28e7-1ff28eb 969->975 978 1ff27c8-1ff2808 VirtualAlloc 970->978 979 1ff27c3 970->979 971->961 982 1ff297c-1ff2987 VirtualFree 972->982 983 1ff298a-1ff2992 972->983 980 1ff291f 973->980 981 1ff2921-1ff292d 973->981 974->975 976 1ff28ed-1ff28f7 975->976 977 1ff28fb 975->977 976->977 977->962 984 1ff280f-1ff282a call 1ff37f0 978->984 985 1ff280a 978->985 979->961 980->972 986 1ff292f-1ff293f 981->986 987 1ff2941-1ff294d 981->987 982->983 993 1ff2835-1ff283f 984->993 985->961 989 1ff2963 986->989 990 1ff294f-1ff2958 987->990 991 1ff295a-1ff2960 987->991 989->967 990->989 991->989 994 1ff2872-1ff2886 call 1ff3600 993->994 995 1ff2841-1ff2870 call 1ff37f0 993->995 1000 1ff288a-1ff288e 994->1000 1001 1ff2888 994->1001 995->993 1003 1ff289a-1ff289e 1000->1003 1004 1ff2890-1ff2894 FindCloseChangeNotification 1000->1004 1001->961 1005 1ff28ae-1ff28b7 1003->1005 1006 1ff28a0-1ff28ab VirtualFree 1003->1006 1004->1003 1005->956 1005->961 1006->1005
                            APIs
                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01FF2761
                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01FF2987
                            Memory Dump Source
                            • Source File: 00000000.00000002.1420631884.0000000001FF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1ff0000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CreateFileFreeVirtual
                            • String ID:
                            • API String ID: 204039940-0
                            • Opcode ID: d148fe5d8863b416e5057870d6e1995944efe260b2a1982c94e468d18abf04d1
                            • Instruction ID: 18723c395c67940484a01c0f3e9f95391c4958aac2734473d06ca601272b55f7
                            • Opcode Fuzzy Hash: d148fe5d8863b416e5057870d6e1995944efe260b2a1982c94e468d18abf04d1
                            • Instruction Fuzzy Hash: FFA10971E00209EBEB14CFA4C894BEEBBB5BF48704F20815DE615BB291D7B69A41CF54

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1074 7439e7-743a57 CreateWindowExW * 2 ShowWindow * 2
                            APIs
                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00743A15
                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00743A36
                            • ShowWindow.USER32(00000000,?,?), ref: 00743A4A
                            • ShowWindow.USER32(00000000,?,?), ref: 00743A53
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$CreateShow
                            • String ID: AutoIt v3$edit
                            • API String ID: 1584632944-3779509399
                            • Opcode ID: 671db9091fe40f80a6f76264d86fd00802033463daadcce9df561b646fa463a4
                            • Instruction ID: a8f6d3aa8156f1501e2d43de9f060f35741253f00ebf5d5ad3c444144431c9b5
                            • Opcode Fuzzy Hash: 671db9091fe40f80a6f76264d86fd00802033463daadcce9df561b646fa463a4
                            • Instruction Fuzzy Hash: DEF0DA71641290BFEA7117276C4DF672E7EE7C6F60B00412EF904A2170D6B91871DAB4

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1075 1ff2410-1ff258d call 1ff0000 call 1ff2300 CreateFileW 1082 1ff258f 1075->1082 1083 1ff2594-1ff25a4 1075->1083 1084 1ff2647-1ff264c 1082->1084 1086 1ff25ab-1ff25c5 VirtualAlloc 1083->1086 1087 1ff25a6 1083->1087 1088 1ff25c9-1ff25e3 ReadFile 1086->1088 1089 1ff25c7 1086->1089 1087->1084 1090 1ff25e7-1ff2621 call 1ff2340 call 1ff1300 1088->1090 1091 1ff25e5 1088->1091 1089->1084 1096 1ff263d-1ff2645 ExitProcess 1090->1096 1097 1ff2623-1ff2638 call 1ff2390 1090->1097 1091->1084 1096->1084 1097->1096
                            APIs
                              • Part of subcall function 01FF2300: Sleep.KERNELBASE(000001F4), ref: 01FF2311
                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01FF2580
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1420631884.0000000001FF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1ff0000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CreateFileSleep
                            • String ID: XPIZU3SOH7ZGRSUV0L38EXHECZFBH
                            • API String ID: 2694422964-469401860
                            • Opcode ID: 17192821db062c89977d19939425f2f8c08fb1bdccf7a0d400287ea78af2a5d2
                            • Instruction ID: b436da30b6de2fd5db1fca379fcf5729ceeddd0925a1d573afd6fb8c02d7a34f
                            • Opcode Fuzzy Hash: 17192821db062c89977d19939425f2f8c08fb1bdccf7a0d400287ea78af2a5d2
                            • Instruction Fuzzy Hash: 5C718470D0428CDAEF12DBA4C8547DEBB75AF15304F044198D2487B2D1D7BA5A49CBA6

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1099 74410d-744123 1100 744200-744204 1099->1100 1101 744129-74413e call 747b76 1099->1101 1104 744144-744164 call 747d2c 1101->1104 1105 77d5dd-77d5ec LoadStringW 1101->1105 1108 77d5f7-77d60f call 747c8e call 747143 1104->1108 1109 74416a-74416e 1104->1109 1105->1108 1118 74417e-7441fb call 763020 call 74463e call 762ffc Shell_NotifyIconW call 745a64 1108->1118 1121 77d615-77d633 call 747e0b call 747143 call 747e0b 1108->1121 1111 744174-744179 call 747c8e 1109->1111 1112 744205-74420e call 7481a7 1109->1112 1111->1118 1112->1118 1118->1100 1121->1118
                            APIs
                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0077D5EC
                              • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                            • _memset.LIBCMT ref: 0074418D
                            • _wcscpy.LIBCMT ref: 007441E1
                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007441F1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                            • String ID: Line:
                            • API String ID: 3942752672-1585850449
                            • Opcode ID: fae45df2c261fc8221b859e903da54c9d91e85e6d5f1ce20df13527c63463de5
                            • Instruction ID: 19a0af8b35c41d6a20e58811dfc103876ac5bacef6529e2e0b7760352244d8ab
                            • Opcode Fuzzy Hash: fae45df2c261fc8221b859e903da54c9d91e85e6d5f1ce20df13527c63463de5
                            • Instruction Fuzzy Hash: 0631D371008318EBE765EB60DC8AFDB77E8BF44300F10451EF595920A1EB789A68C796

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1134 76564d-765666 1135 765683 1134->1135 1136 765668-76566d 1134->1136 1138 765685-76568b 1135->1138 1136->1135 1137 76566f-765671 1136->1137 1139 765673-765678 call 768d68 1137->1139 1140 76568c-765691 1137->1140 1150 76567e call 768ff6 1139->1150 1142 765693-76569d 1140->1142 1143 76569f-7656a3 1140->1143 1142->1143 1145 7656c3-7656d2 1142->1145 1146 7656a5-7656b0 call 763020 1143->1146 1147 7656b3-7656b5 1143->1147 1148 7656d4-7656d7 1145->1148 1149 7656d9 1145->1149 1146->1147 1147->1139 1152 7656b7-7656c1 1147->1152 1153 7656de-7656e3 1148->1153 1149->1153 1150->1135 1152->1139 1152->1145 1156 7657cc-7657cf 1153->1156 1157 7656e9-7656f0 1153->1157 1156->1138 1158 7656f2-7656fa 1157->1158 1159 765731-765733 1157->1159 1158->1159 1160 7656fc 1158->1160 1161 765735-765737 1159->1161 1162 76579d-76579e call 770df7 1159->1162 1163 765702-765704 1160->1163 1164 7657fa 1160->1164 1165 76575b-765766 1161->1165 1166 765739-765741 1161->1166 1170 7657a3-7657a7 1162->1170 1173 765706-765708 1163->1173 1174 76570b-765710 1163->1174 1175 7657fe-765807 1164->1175 1171 76576a-76576d 1165->1171 1172 765768 1165->1172 1168 765743-76574f 1166->1168 1169 765751-765755 1166->1169 1176 765757-765759 1168->1176 1169->1176 1170->1175 1177 7657a9-7657ae 1170->1177 1178 7657d4-7657d8 1171->1178 1179 76576f-76577b call 764916 call 7710ab 1171->1179 1172->1171 1173->1174 1174->1178 1180 765716-76572f call 770f18 1174->1180 1175->1138 1176->1171 1177->1178 1181 7657b0-7657c1 1177->1181 1182 7657ea-7657f5 call 768d68 1178->1182 1183 7657da-7657e7 call 763020 1178->1183 1195 765780-765785 1179->1195 1194 765792-76579b 1180->1194 1186 7657c4-7657c6 1181->1186 1182->1150 1183->1182 1186->1156 1186->1157 1194->1186 1196 76580c-765810 1195->1196 1197 76578b-76578e 1195->1197 1196->1175 1197->1164 1198 765790 1197->1198 1198->1194
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                            • String ID:
                            • API String ID: 1559183368-0
                            • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                            • Instruction ID: 990e5cb23cc458da7f234c12e1fcf39f3530ccd544f42378450b102ddee986b8
                            • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                            • Instruction Fuzzy Hash: 29518030A00B05DFDB249FB9C88466EB7A5AF40720F648729FC2B962D1D7789D50EB50
                            APIs
                              • Part of subcall function 00744F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,008062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00744F6F
                            • _free.LIBCMT ref: 0077E68C
                            • _free.LIBCMT ref: 0077E6D3
                              • Part of subcall function 00746BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00746D0D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _free$CurrentDirectoryLibraryLoad
                            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                            • API String ID: 2861923089-1757145024
                            • Opcode ID: 8389cac8cc0561ea0a110d3e7992e14ca6aa76b49e54977b166e9682bf6ed82a
                            • Instruction ID: e1885c9e80b2339abfd3ad20d568d003f6b45e60f87440f397c6f6fbca870d76
                            • Opcode Fuzzy Hash: 8389cac8cc0561ea0a110d3e7992e14ca6aa76b49e54977b166e9682bf6ed82a
                            • Instruction Fuzzy Hash: BF918E71A10219EFCF04EFA4CC859EDB7B4FF19354B148469F815EB291EB38A915CB60
                            APIs
                              • Part of subcall function 007603A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 007603D3
                              • Part of subcall function 007603A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 007603DB
                              • Part of subcall function 007603A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 007603E6
                              • Part of subcall function 007603A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 007603F1
                              • Part of subcall function 007603A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 007603F9
                              • Part of subcall function 007603A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00760401
                              • Part of subcall function 00756259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0074FA90), ref: 007562B4
                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0074FB2D
                            • OleInitialize.OLE32(00000000), ref: 0074FBAA
                            • CloseHandle.KERNEL32(00000000), ref: 007849F2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                            • String ID: %}
                            • API String ID: 1986988660-578177530
                            • Opcode ID: eb06dd21bde60d0918c08f0b7dbbbe51b39137472ff6fdd37a19b290685b957f
                            • Instruction ID: a1a9b04852513389af2eaaf4a45a7f7692f47019c650ddfd854381b1436ab47c
                            • Opcode Fuzzy Hash: eb06dd21bde60d0918c08f0b7dbbbe51b39137472ff6fdd37a19b290685b957f
                            • Instruction Fuzzy Hash: 0081B9B0A01A40CEC3C8DF69AD896157BE5FB89318710823AD119C73A2FB794439CF98
                            APIs
                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,007435A1,SwapMouseButtons,00000004,?), ref: 007435D4
                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,007435A1,SwapMouseButtons,00000004,?,?,?,?,00742754), ref: 007435F5
                            • RegCloseKey.KERNELBASE(00000000,?,?,007435A1,SwapMouseButtons,00000004,?,?,?,?,00742754), ref: 00743617
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID: Control Panel\Mouse
                            • API String ID: 3677997916-824357125
                            • Opcode ID: 3612f3f2c1b80458e4e649128440b1e8590b957cf4c2449405ffae8baface32e
                            • Instruction ID: cdb4db237cb656fc65c2f0c4a8b94129efd81d3498cbfc016a4878443bb226af
                            • Opcode Fuzzy Hash: 3612f3f2c1b80458e4e649128440b1e8590b957cf4c2449405ffae8baface32e
                            • Instruction Fuzzy Hash: 1A115771610209BFDB209F64DC80EEEBBB9EF04740F128469F809D7210E3759F409BA6
                            APIs
                            • CreateProcessW.KERNELBASE(?,00000000), ref: 01FF1B2D
                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01FF1B51
                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01FF1B73
                            Memory Dump Source
                            • Source File: 00000000.00000002.1420631884.0000000001FF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1ff0000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                            • String ID:
                            • API String ID: 2438371351-0
                            • Opcode ID: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                            • Instruction ID: a592f33dca1cdaaa788fec9ccaad4243fde7125be64f43d0c723b9116057fc85
                            • Opcode Fuzzy Hash: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                            • Instruction Fuzzy Hash: 8A62F030A14658DBEB24CF64C850BDEB775EF58300F1091A9D20DEB3A4E7B69E81CB55
                            APIs
                              • Part of subcall function 00745045: _fseek.LIBCMT ref: 0074505D
                              • Part of subcall function 007A99BE: _wcscmp.LIBCMT ref: 007A9AAE
                              • Part of subcall function 007A99BE: _wcscmp.LIBCMT ref: 007A9AC1
                            • _free.LIBCMT ref: 007A992C
                            • _free.LIBCMT ref: 007A9933
                            • _free.LIBCMT ref: 007A999E
                              • Part of subcall function 00762F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00769C64), ref: 00762FA9
                              • Part of subcall function 00762F95: GetLastError.KERNEL32(00000000,?,00769C64), ref: 00762FBB
                            • _free.LIBCMT ref: 007A99A6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                            • String ID:
                            • API String ID: 1552873950-0
                            • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                            • Instruction ID: d2832847bd0f9b5c655aefe39bd695ae1a4052788d806671e2f88c7454a9ea3e
                            • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                            • Instruction Fuzzy Hash: 2C5160B1D04218EFDF249F64CC45A9EBBB9EF89300F1005AEB609A7251DB355E90CF59
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                            • String ID:
                            • API String ID: 2782032738-0
                            • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                            • Instruction ID: 04816d767bd2fd1efdccf1b264e6430e03ad742fe6472eb842a98e5505d828e5
                            • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                            • Instruction Fuzzy Hash: D241D575640705AFDF28DEA9C8849AF7BAAEF80360B24C13DEC57D7640E778AD408B44
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: AU3!P/}$EA06
                            • API String ID: 4104443479-3992199863
                            • Opcode ID: 2608edaad9305bc4f12367b5a8a0276303ca733f5df61c771326a98b0eb5e120
                            • Instruction ID: d5a962b655117203fe46ec494a9a564d4e361c11b9243391b41611dc30d44b28
                            • Opcode Fuzzy Hash: 2608edaad9305bc4f12367b5a8a0276303ca733f5df61c771326a98b0eb5e120
                            • Instruction Fuzzy Hash: 0B416A71A041A8ABDF219F648C557BE7FA6AF06300F684065FC829B283C73D9D44A7E1
                            APIs
                            • _memset.LIBCMT ref: 0077EE62
                            • GetOpenFileNameW.COMDLG32(?), ref: 0077EEAC
                              • Part of subcall function 007448AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007448A1,?,?,007437C0,?), ref: 007448CE
                              • Part of subcall function 007609D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007609F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Name$Path$FileFullLongOpen_memset
                            • String ID: X
                            • API String ID: 3777226403-3081909835
                            • Opcode ID: 54dbb020c78708fee58bd0f65416a8c8fd0d1b9257cd105003cc4f255d0de97f
                            • Instruction ID: 8c8085f7110715e3ddc27e717debd94e73b462e8e34c785efe2d36697c447a00
                            • Opcode Fuzzy Hash: 54dbb020c78708fee58bd0f65416a8c8fd0d1b9257cd105003cc4f255d0de97f
                            • Instruction Fuzzy Hash: 1921A471A10298DBDF059F94C849BEE7BF99F49310F008059E509A7241DBBC5989CF91
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __fread_nolock_memmove
                            • String ID: EA06
                            • API String ID: 1988441806-3962188686
                            • Opcode ID: 68544486bd5718f69661a66a2086613020c3ee9c1f5429f9db8ecc74e0118c7e
                            • Instruction ID: d797d1211ac8dce8511713b27cdfacf8152c2db7a8245e15bcb79d0f290a4a9d
                            • Opcode Fuzzy Hash: 68544486bd5718f69661a66a2086613020c3ee9c1f5429f9db8ecc74e0118c7e
                            • Instruction Fuzzy Hash: 8001B971904258BEDB28C7A8CC5AEFE7BF8DB15301F00419AF553D2581E579A6149B60
                            APIs
                            • GetTempPathW.KERNEL32(00000104,?), ref: 007A9B82
                            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 007A9B99
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Temp$FileNamePath
                            • String ID: aut
                            • API String ID: 3285503233-3010740371
                            • Opcode ID: ac840a13dfb9e94311514f829cf783f41a89520d47f2c926c738b8a2bb0f0fa2
                            • Instruction ID: 672e881de40a98acd52a02acbdff258cc223f07eea6135ea61b2c557cd85ef7b
                            • Opcode Fuzzy Hash: ac840a13dfb9e94311514f829cf783f41a89520d47f2c926c738b8a2bb0f0fa2
                            • Instruction Fuzzy Hash: ACD05B7554030D7BDB109B94DC0DFAA772CE704700F0041A1FF5491191DDB455948B95
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8a43e27b96558c488ce5e9ef2e395dc78489d4973b1df0410a3bc733fe01e3b2
                            • Instruction ID: a0504c4b44a2a96bbf5fea72cc25f74644a9976181138197e536c49d85e6984f
                            • Opcode Fuzzy Hash: 8a43e27b96558c488ce5e9ef2e395dc78489d4973b1df0410a3bc733fe01e3b2
                            • Instruction Fuzzy Hash: 89F11671608345DFC724DF28C484AAABBE5BF88314F14892DF8999B251E739ED45CF82
                            APIs
                            • _memset.LIBCMT ref: 00744401
                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 007444A6
                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 007444C3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: IconNotifyShell_$_memset
                            • String ID:
                            • API String ID: 1505330794-0
                            • Opcode ID: de49a857754748b19fac44bb67b5df1a6d5cbca01a6bd14f46f8cc8bbb7e9024
                            • Instruction ID: 55443a2f8daa26bb8e8d83e06cbf26dd515e28d84d62abc6d6fd58bd50df7cb5
                            • Opcode Fuzzy Hash: de49a857754748b19fac44bb67b5df1a6d5cbca01a6bd14f46f8cc8bbb7e9024
                            • Instruction Fuzzy Hash: DD318FB0505741CFD760DF68D884B9BBBF8FB49308F00092EF59A83240E779A958DB92
                            APIs
                            • __FF_MSGBANNER.LIBCMT ref: 00765963
                              • Part of subcall function 0076A3AB: __NMSG_WRITE.LIBCMT ref: 0076A3D2
                              • Part of subcall function 0076A3AB: __NMSG_WRITE.LIBCMT ref: 0076A3DC
                            • __NMSG_WRITE.LIBCMT ref: 0076596A
                              • Part of subcall function 0076A408: GetModuleFileNameW.KERNEL32(00000000,008043BA,00000104,?,00000001,00000000), ref: 0076A49A
                              • Part of subcall function 0076A408: ___crtMessageBoxW.LIBCMT ref: 0076A548
                              • Part of subcall function 007632DF: ___crtCorExitProcess.LIBCMT ref: 007632E5
                              • Part of subcall function 007632DF: ExitProcess.KERNEL32 ref: 007632EE
                              • Part of subcall function 00768D68: __getptd_noexit.LIBCMT ref: 00768D68
                            • RtlAllocateHeap.NTDLL(012A0000,00000000,00000001,00000000,?,?,?,00761013,?), ref: 0076598F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                            • String ID:
                            • API String ID: 1372826849-0
                            • Opcode ID: 3d6c7cba9619fcb828c5b6dec82ae4ff35a98b98bed92d9f91e1b39c7396b752
                            • Instruction ID: 67f96297581dbe972cf4081630c5281ff94820d3c75f8108b8eb3fbfdf69e795
                            • Opcode Fuzzy Hash: 3d6c7cba9619fcb828c5b6dec82ae4ff35a98b98bed92d9f91e1b39c7396b752
                            • Instruction Fuzzy Hash: 7701D271340B15EEE6113B34DC46A2E72989F42730F10012AFD03AB182DF7CAD41AA61
                            APIs
                            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,007A97D2,?,?,?,?,?,00000004), ref: 007A9B45
                            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,007A97D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 007A9B5B
                            • CloseHandle.KERNEL32(00000000,?,007A97D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007A9B62
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: File$CloseCreateHandleTime
                            • String ID:
                            • API String ID: 3397143404-0
                            • Opcode ID: 1344cc9387740694b13f4144ecaaaabfc6d30ed7f2a65c77d076a2f994349ed5
                            • Instruction ID: fdb716e05950df86d17423a5a63d1ed8e5708a19770c4581de3a9713b1ec5732
                            • Opcode Fuzzy Hash: 1344cc9387740694b13f4144ecaaaabfc6d30ed7f2a65c77d076a2f994349ed5
                            • Instruction Fuzzy Hash: 2AE08632180218B7D7211B54EC09FCA7F19AB45761F148225FB14690E087B56521979C
                            APIs
                            • _free.LIBCMT ref: 007A8FA5
                              • Part of subcall function 00762F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00769C64), ref: 00762FA9
                              • Part of subcall function 00762F95: GetLastError.KERNEL32(00000000,?,00769C64), ref: 00762FBB
                            • _free.LIBCMT ref: 007A8FB6
                            • _free.LIBCMT ref: 007A8FC8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                            • Instruction ID: 86e442b7dec3a6a1333fee9a4cb1f56abcbf1e4f9a42c7521615020d7353b0d4
                            • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                            • Instruction Fuzzy Hash: AFE012A1A09B028ECAA4A578AD48AD357EE5F89351B28091DB80ADB143DE2CEC428124
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID: CALL
                            • API String ID: 0-4196123274
                            • Opcode ID: 1bc221f1c07644654ddb3cb77483297b460dad3d8950a9f7aa36004f662bab74
                            • Instruction ID: e313d73c3ac4b9a4fd21ad3b182ad111d17429021404f180e1ee9b82fe7276df
                            • Opcode Fuzzy Hash: 1bc221f1c07644654ddb3cb77483297b460dad3d8950a9f7aa36004f662bab74
                            • Instruction Fuzzy Hash: B6224974648251DFCB24DF14C494B6ABBE1FF85300F15895DE89A8B362D739EC45CB82
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _wcscmp
                            • String ID: t
                            • API String ID: 856254489-2238339752
                            • Opcode ID: 7e10e559e00a8f675287b2d9be152152de1ca6b730900679b7320cffd5c37463
                            • Instruction ID: f799503c1319991301b86414b9635088e06e43fd5188860d01fa44a03e063b53
                            • Opcode Fuzzy Hash: 7e10e559e00a8f675287b2d9be152152de1ca6b730900679b7320cffd5c37463
                            • Instruction Fuzzy Hash: 3401D272D062559FDB1A9F2CC8806ADFBB5DF56360F06819AD810AF2A1D73C9C01CB95
                            APIs
                            • IsThemeActive.UXTHEME ref: 00744992
                              • Part of subcall function 007635AC: __lock.LIBCMT ref: 007635B2
                              • Part of subcall function 007635AC: DecodePointer.KERNEL32(00000001,?,007449A7,007981BC), ref: 007635BE
                              • Part of subcall function 007635AC: EncodePointer.KERNEL32(?,?,007449A7,007981BC), ref: 007635C9
                              • Part of subcall function 00744A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00744A73
                              • Part of subcall function 00744A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00744A88
                              • Part of subcall function 00743B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00743B7A
                              • Part of subcall function 00743B4C: IsDebuggerPresent.KERNEL32 ref: 00743B8C
                              • Part of subcall function 00743B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,008062F8,008062E0,?,?), ref: 00743BFD
                              • Part of subcall function 00743B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00743C81
                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 007449D2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                            • String ID:
                            • API String ID: 1438897964-0
                            • Opcode ID: 8780d25e96f198d10da0839455a325703d466394b3442adfdf0507d4ac6d0e85
                            • Instruction ID: 2fb00775d6437c2a83235c9c1ae667b7d4aa483605ed4985ba440f198f3d58d2
                            • Opcode Fuzzy Hash: 8780d25e96f198d10da0839455a325703d466394b3442adfdf0507d4ac6d0e85
                            • Instruction Fuzzy Hash: BC119A71A08311DBC700EF28EC4990AFFE8FB98710F00851EF445932B1EBB49665CB96
                            APIs
                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00745981,?,?,?,?), ref: 00745E27
                            • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00745981,?,?,?,?), ref: 0077E19C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CreateFile
                            • String ID:
                            • API String ID: 823142352-0
                            • Opcode ID: d1c4c74d8490f177f6a8645f50fe7032d3e8ad703b18dd565bb0362c384200ff
                            • Instruction ID: 4d7b4f75c6b4dd68caaed3226bd15bdefe9cbc5961ccf4aa359a1d81257b536c
                            • Opcode Fuzzy Hash: d1c4c74d8490f177f6a8645f50fe7032d3e8ad703b18dd565bb0362c384200ff
                            • Instruction Fuzzy Hash: FD015270244718BFF7250E24CC8AF663B9CAB05768F14C319FAE55E1E1C7B85E458B54
                            APIs
                              • Part of subcall function 0076594C: __FF_MSGBANNER.LIBCMT ref: 00765963
                              • Part of subcall function 0076594C: __NMSG_WRITE.LIBCMT ref: 0076596A
                              • Part of subcall function 0076594C: RtlAllocateHeap.NTDLL(012A0000,00000000,00000001,00000000,?,?,?,00761013,?), ref: 0076598F
                            • std::exception::exception.LIBCMT ref: 0076102C
                            • __CxxThrowException@8.LIBCMT ref: 00761041
                              • Part of subcall function 007687DB: RaiseException.KERNEL32(?,?,?,007FBAF8,00000000,?,?,?,?,00761046,?,007FBAF8,?,00000001), ref: 00768830
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                            • String ID:
                            • API String ID: 3902256705-0
                            • Opcode ID: b79675f1ac4c31f89522dcb83e5705d237316d548fe7c0efc7f01137b7c4a880
                            • Instruction ID: 7f166a02144fa770190f14bfd7386555265faf6c0df12369b2f09b2d1d6badca
                            • Opcode Fuzzy Hash: b79675f1ac4c31f89522dcb83e5705d237316d548fe7c0efc7f01137b7c4a880
                            • Instruction Fuzzy Hash: 6BF0283460030DE6CF21BB98EC0D9DF77AC9F00350F640126FC06A2282EFB89A8192D1
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __lock_file_memset
                            • String ID:
                            • API String ID: 26237723-0
                            • Opcode ID: 998173cff1a497950c449fbf1e005fc3fce38157dba8be6a47b2b98914299a8d
                            • Instruction ID: ab62601584eb563cb62a5e8cec8372a9f53888d26269bf4fdd5064b1b53811c3
                            • Opcode Fuzzy Hash: 998173cff1a497950c449fbf1e005fc3fce38157dba8be6a47b2b98914299a8d
                            • Instruction Fuzzy Hash: 7801A771C00A09EBCF12AF69CC0999F7B61AF80360F148315FC166B1A1DB3D8A51EB91
                            APIs
                              • Part of subcall function 00768D68: __getptd_noexit.LIBCMT ref: 00768D68
                            • __lock_file.LIBCMT ref: 0076561B
                              • Part of subcall function 00766E4E: __lock.LIBCMT ref: 00766E71
                            • __fclose_nolock.LIBCMT ref: 00765626
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                            • String ID:
                            • API String ID: 2800547568-0
                            • Opcode ID: 3ca77da9c438ab2afe7410447002b4968e3e72a52b7da23600ae3541c434f28b
                            • Instruction ID: d8dadbd5701d326020abafa41f4036fbf5a0f15f530cef61153f935acc55019a
                            • Opcode Fuzzy Hash: 3ca77da9c438ab2afe7410447002b4968e3e72a52b7da23600ae3541c434f28b
                            • Instruction Fuzzy Hash: 50F024B1800A04DAD760AF38C80A76E77A12F00B30F548309AC17AB1C1CF7C8941EB56
                            APIs
                            • CreateProcessW.KERNELBASE(?,00000000), ref: 01FF1B2D
                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01FF1B51
                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01FF1B73
                            Memory Dump Source
                            • Source File: 00000000.00000002.1420631884.0000000001FF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1ff0000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                            • String ID:
                            • API String ID: 2438371351-0
                            • Opcode ID: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                            • Instruction ID: 41df5bc65dd52d28557838dbd0ffbfc3bae34ccfe97b7e27ee238d6abb79660d
                            • Opcode Fuzzy Hash: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                            • Instruction Fuzzy Hash: 6912EE24E18658C6EB24DF64D8507DEB232EF68300F1091ED910DEB7A4E77A5E81CF5A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5132619147255654998fe2637bcfaef8c3cb6f68d89a427af21dbd40fe19860d
                            • Instruction ID: 46bbde34cf83ff2cb70ba9eece2b0f5fefda1041b7164e4cc26d162b262880f2
                            • Opcode Fuzzy Hash: 5132619147255654998fe2637bcfaef8c3cb6f68d89a427af21dbd40fe19860d
                            • Instruction Fuzzy Hash: 9161AB7060024ADFCB20EF64C885AABB7F5EF44300F14817DE9069B242EB78ED61CB51
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ac387207f736bc5ee4a6211190456f0456e6afc1301f5a6c7351ea3c338c0805
                            • Instruction ID: 8fd4f4954b2698a8316b59ea915f89c608e54281401866618171182642043c45
                            • Opcode Fuzzy Hash: ac387207f736bc5ee4a6211190456f0456e6afc1301f5a6c7351ea3c338c0805
                            • Instruction Fuzzy Hash: BA51AE35700604EFCF14EB64C999EAE77A6AF85710F148168F946AB383DB38ED05CB51
                            APIs
                            • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00745CF6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: 4bbfbd0ea48fa89dd1649faee3ca531c4e4b057f8e3a6b2ca8901c8d4d7a1dc6
                            • Instruction ID: 0b65cb014719a9ef90a995094b48699e7013a071f8c756bd0c2a3a1d170de72a
                            • Opcode Fuzzy Hash: 4bbfbd0ea48fa89dd1649faee3ca531c4e4b057f8e3a6b2ca8901c8d4d7a1dc6
                            • Instruction Fuzzy Hash: C2311971A00B1AEBCB18DF6DC484AADB7B5FF48310F148629E81993711D775AD60DBA0
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClearVariant
                            • String ID:
                            • API String ID: 1473721057-0
                            • Opcode ID: 11a9e0789c53300575faffc7f2804950357cd997b9868043e7e4c387dcc58345
                            • Instruction ID: 252d20c75f56f16e7420abad576226f49e661d59e951ea2a3507c111d4c4f6df
                            • Opcode Fuzzy Hash: 11a9e0789c53300575faffc7f2804950357cd997b9868043e7e4c387dcc58345
                            • Instruction Fuzzy Hash: B041F774604351DFDB14DF14C488B1ABBE1BF45314F1988ACE9994B762C339EC45CB92
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID:
                            • API String ID: 4104443479-0
                            • Opcode ID: 9892bb415d2d291bb0d52fd00fc7593e376d74fd9eef8e7e418a5b3e7a89eda8
                            • Instruction ID: 7dfa97496efd5a6d205c44d0f69a4e327b202cb005a0c36feb52275cf5e3e71d
                            • Opcode Fuzzy Hash: 9892bb415d2d291bb0d52fd00fc7593e376d74fd9eef8e7e418a5b3e7a89eda8
                            • Instruction Fuzzy Hash: 4F21D2B0A00A08EBDF105F51EC8967A7FB8FF14390F31C4AAE88AD1512EB7894E0D755
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _wcscmp
                            • String ID:
                            • API String ID: 856254489-0
                            • Opcode ID: 3148cd4fcf84883c0b7e6bbd1a05fd6f8d18a9dd28de680d57cd8b359a3a194f
                            • Instruction ID: 87636c4a424f9aea40ec5fa1eb140c1189a9a1c13d4c77508cba441cbccc8735
                            • Opcode Fuzzy Hash: 3148cd4fcf84883c0b7e6bbd1a05fd6f8d18a9dd28de680d57cd8b359a3a194f
                            • Instruction Fuzzy Hash: DF11B47290111DDBCB15EBA9DC859EEF77CEF55350F108126F811AB190EB389D06CBA1
                            APIs
                              • Part of subcall function 00744D13: FreeLibrary.KERNEL32(00000000,?), ref: 00744D4D
                              • Part of subcall function 0076548B: __wfsopen.LIBCMT ref: 00765496
                            • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,008062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00744F6F
                              • Part of subcall function 00744CC8: FreeLibrary.KERNEL32(00000000), ref: 00744D02
                              • Part of subcall function 00744DD0: _memmove.LIBCMT ref: 00744E1A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Library$Free$Load__wfsopen_memmove
                            • String ID:
                            • API String ID: 1396898556-0
                            • Opcode ID: 12c77ddcac6dad31c2fa1f27be63f26b61958f9f0022de0d89e65969f72cabaf
                            • Instruction ID: 87bb789b30f62de7d826693a7d27977c188fe456ea2a086e741307b018beaa4b
                            • Opcode Fuzzy Hash: 12c77ddcac6dad31c2fa1f27be63f26b61958f9f0022de0d89e65969f72cabaf
                            • Instruction Fuzzy Hash: 4211E732700605EBCF20AF70DC5AFAE77A59F40700F14842DF541A61C1DF799E15AB60
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClearVariant
                            • String ID:
                            • API String ID: 1473721057-0
                            • Opcode ID: d6d6ac6d5202f33fbfc253a41f893dd0bff249b79d3d5d09dd221e95f3e13af7
                            • Instruction ID: 41ea29b12a09d5ecb2083a5306110611472f0b10fe05ed2439f49a4b7bb8905b
                            • Opcode Fuzzy Hash: d6d6ac6d5202f33fbfc253a41f893dd0bff249b79d3d5d09dd221e95f3e13af7
                            • Instruction Fuzzy Hash: 1B2133B4648351DFCB14DF24C449A1ABBE0BF84304F04896CE99A57761D739E849CB92
                            APIs
                            • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00745807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00745D76
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: 09ca232f559dc344d039f3122899c732afd96274be8df544a0710c7bc989b813
                            • Instruction ID: e3c876890542975c436561c4cc8b475f1c3e6a4362317ae9c6137856713e2c0b
                            • Opcode Fuzzy Hash: 09ca232f559dc344d039f3122899c732afd96274be8df544a0710c7bc989b813
                            • Instruction Fuzzy Hash: EB113631600B059FD3308F15C888B62B7E9EF45760F14C92EE4AA86A52D7B8E945CF60
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID:
                            • API String ID: 4104443479-0
                            • Opcode ID: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                            • Instruction ID: 2b7e23979ea92b74726bdada905ccdea1914a966cf8d5871a70ce2ffbfac4f62
                            • Opcode Fuzzy Hash: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                            • Instruction Fuzzy Hash: 63018FB9604542EFC705DB69D846D2AFBA9FF8A3503148159F819C7702DB34EC21CBE0
                            APIs
                            • __lock_file.LIBCMT ref: 00764AD6
                              • Part of subcall function 00768D68: __getptd_noexit.LIBCMT ref: 00768D68
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __getptd_noexit__lock_file
                            • String ID:
                            • API String ID: 2597487223-0
                            • Opcode ID: ffeb5d2d0f59210a871c3e84d02b6fb2f1e425bf17f75b0a004318506c0e17d8
                            • Instruction ID: 2eb636afb97fb50fc6526815cf2c4ef4b8c6f071ea6ff7ba91669a25237d9ced
                            • Opcode Fuzzy Hash: ffeb5d2d0f59210a871c3e84d02b6fb2f1e425bf17f75b0a004318506c0e17d8
                            • Instruction Fuzzy Hash: A9F06871940209EBDFA1AFB4CC0A7DF7661AF00325F188614FC26AA1D1DB7C8951DF55
                            APIs
                            • FreeLibrary.KERNEL32(?,?,008062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00744FDE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FreeLibrary
                            • String ID:
                            • API String ID: 3664257935-0
                            • Opcode ID: 630007936972c2b791b072fc7b696360a1a95b8d0307382a51652062c25a1c68
                            • Instruction ID: 47518251b596a560e6bd1491d3823aa2ee6c8e9d8255403d814ddd5640853fe5
                            • Opcode Fuzzy Hash: 630007936972c2b791b072fc7b696360a1a95b8d0307382a51652062c25a1c68
                            • Instruction Fuzzy Hash: 4AF06DB1105712CFCB349F64E494922BBF2BF043293288E3EE5E782610C739A858EF40
                            APIs
                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007609F4
                              • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: LongNamePath_memmove
                            • String ID:
                            • API String ID: 2514874351-0
                            • Opcode ID: cf82a3f8adcded959a9c8fff02906b7522d56868512ce868c94257cb470717e6
                            • Instruction ID: 4992e58f4d717b6b4f1c9e76ad69c65133138e4af6e24e73102b18c10e3a322d
                            • Opcode Fuzzy Hash: cf82a3f8adcded959a9c8fff02906b7522d56868512ce868c94257cb470717e6
                            • Instruction Fuzzy Hash: 3DE08676A0422897C720D6589C09FFA77ADDF88690F0441B5FC0CD7214DA649C818690
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __fread_nolock
                            • String ID:
                            • API String ID: 2638373210-0
                            • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                            • Instruction ID: 66a678a42bd33ec5edae9ba894c0e2ba634849c13344e4fda9e498a460eb91bb
                            • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                            • Instruction Fuzzy Hash: D1E09AB0204B059FDB398A28D814BE373E0AB06315F00091CF6AB83342EB66B8418B59
                            APIs
                            • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,0077E16B,?,?,00000000), ref: 00745DBF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: 79821be7e9ec403f67e1158de794e413c1f2796c68df8d7a4334467415111048
                            • Instruction ID: 1fecf077c5b877c17e41dceaca62faaa169285ad67572502f67ec9b12b529755
                            • Opcode Fuzzy Hash: 79821be7e9ec403f67e1158de794e413c1f2796c68df8d7a4334467415111048
                            • Instruction Fuzzy Hash: 41D0C77464020CBFE710DB80DC46FA9777DD705710F100195FD0456290D6B27D508795
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __wfsopen
                            • String ID:
                            • API String ID: 197181222-0
                            • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                            • Instruction ID: cbd40fcf4633431ff485e4f878eac26aa6b5fba48aa657b7c2756b889f5d3c8e
                            • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                            • Instruction Fuzzy Hash: BEB0927684020CB7DE012E82EC02A593F199B40678F808060FF0C18562AA77A6A0A689
                            APIs
                            • GetLastError.KERNEL32(00000002,00000000), ref: 007AD46A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorLast
                            • String ID:
                            • API String ID: 1452528299-0
                            • Opcode ID: 2699b4d8421b2990182d748775c5ac787fbce4e8fe1a0de0933ff2486d6e058e
                            • Instruction ID: fb1b8b72bb632db0c519dbd2ba3ed4c527b9abb05dea97494c526d544e282fa6
                            • Opcode Fuzzy Hash: 2699b4d8421b2990182d748775c5ac787fbce4e8fe1a0de0933ff2486d6e058e
                            • Instruction Fuzzy Hash: 4D717230208341CFC714EF24C4D5A6EB7E4AF89314F044A6DF9969B6A2DB38ED49CB52
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                            • Instruction ID: d843de43c6ba38f1a92fb4fcda11a6f03c82e846a1df1b102033e03af97fd5cd
                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                            • Instruction Fuzzy Hash: AA31D671A00115DFC718EF58D48096AF7B6FF59300B688AA5E80ACB651D73AEDC1CBC0
                            APIs
                            • Sleep.KERNELBASE(000001F4), ref: 01FF2311
                            Memory Dump Source
                            • Source File: 00000000.00000002.1420631884.0000000001FF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1ff0000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Sleep
                            • String ID:
                            • API String ID: 3472027048-0
                            • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                            • Instruction ID: cda36fc6b653edaada871eb9bde1e457fb636a0b925ae936420090fbc757047f
                            • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                            • Instruction Fuzzy Hash: 29E0BF7494110DEFDB00EFB4D5496DE7BB4EF04301F1005A5FD05D7691DB719E548A62
                            APIs
                            • Sleep.KERNELBASE(000001F4), ref: 01FF2311
                            Memory Dump Source
                            • Source File: 00000000.00000002.1420631884.0000000001FF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1ff0000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Sleep
                            • String ID:
                            • API String ID: 3472027048-0
                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                            • Instruction ID: a7a8f5c88b89ad041bc58025c8b333350ae96627b59efd6ecd7cee120f62a9f7
                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                            • Instruction Fuzzy Hash: 8EE0E67494110DDFDB00EFB4D54969E7FB4EF04301F100565FD01D2281D7719D508A62
                            APIs
                              • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 007CCE50
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007CCE91
                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 007CCED6
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007CCF00
                            • SendMessageW.USER32 ref: 007CCF29
                            • _wcsncpy.LIBCMT ref: 007CCFA1
                            • GetKeyState.USER32(00000011), ref: 007CCFC2
                            • GetKeyState.USER32(00000009), ref: 007CCFCF
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007CCFE5
                            • GetKeyState.USER32(00000010), ref: 007CCFEF
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007CD018
                            • SendMessageW.USER32 ref: 007CD03F
                            • SendMessageW.USER32(?,00001030,?,007CB602), ref: 007CD145
                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 007CD15B
                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 007CD16E
                            • SetCapture.USER32(?), ref: 007CD177
                            • ClientToScreen.USER32(?,?), ref: 007CD1DC
                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 007CD1E9
                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007CD203
                            • ReleaseCapture.USER32 ref: 007CD20E
                            • GetCursorPos.USER32(?), ref: 007CD248
                            • ScreenToClient.USER32(?,?), ref: 007CD255
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 007CD2B1
                            • SendMessageW.USER32 ref: 007CD2DF
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 007CD31C
                            • SendMessageW.USER32 ref: 007CD34B
                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 007CD36C
                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 007CD37B
                            • GetCursorPos.USER32(?), ref: 007CD39B
                            • ScreenToClient.USER32(?,?), ref: 007CD3A8
                            • GetParent.USER32(?), ref: 007CD3C8
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 007CD431
                            • SendMessageW.USER32 ref: 007CD462
                            • ClientToScreen.USER32(?,?), ref: 007CD4C0
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 007CD4F0
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 007CD51A
                            • SendMessageW.USER32 ref: 007CD53D
                            • ClientToScreen.USER32(?,?), ref: 007CD58F
                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 007CD5C3
                              • Part of subcall function 007425DB: GetWindowLongW.USER32(?,000000EB), ref: 007425EC
                            • GetWindowLongW.USER32(?,000000F0), ref: 007CD65F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                            • String ID: @GUI_DRAGID$F
                            • API String ID: 3977979337-4164748364
                            • Opcode ID: 377698d43a07123a10e832e495ce466b7fa5fbcd537151a8fa5e40399b80da31
                            • Instruction ID: 7bc66f3969c82b2c9a21e152218cc75ed21140450ab2bd5f34f265fd2b4ba09d
                            • Opcode Fuzzy Hash: 377698d43a07123a10e832e495ce466b7fa5fbcd537151a8fa5e40399b80da31
                            • Instruction Fuzzy Hash: 22427B30204241AFD726CF68C848FAABBE5FF49314F14452DF6999B2A1D7399864CF92
                            APIs
                            • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 007C873F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: %d/%02d/%02d
                            • API String ID: 3850602802-328681919
                            • Opcode ID: 55e34e49e242ec43c88ccb781013bba07e8d0e9fd1874c24a7d256451ba816bd
                            • Instruction ID: 6aa8da21ac6aa5a1bb925bc3a02d46a7822caae170459c07bab7dcba3c67df24
                            • Opcode Fuzzy Hash: 55e34e49e242ec43c88ccb781013bba07e8d0e9fd1874c24a7d256451ba816bd
                            • Instruction Fuzzy Hash: F512DF71500248ABEB658F64CC49FAF7BB9EF85310F24412DF916EA2E1EF789941CB11
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memmove$_memset
                            • String ID: DEFINE$Oau$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                            • API String ID: 1357608183-2223249883
                            • Opcode ID: 13eba9412650ddeb64d6462e6a58fcd4288c073659c427f174429501dcbda735
                            • Instruction ID: 0d4d184b8ccc3bd645e37e2c6bedaba030db7e214de23e5fbe023a155690c8db
                            • Opcode Fuzzy Hash: 13eba9412650ddeb64d6462e6a58fcd4288c073659c427f174429501dcbda735
                            • Instruction Fuzzy Hash: 3D93A371A04219DBDF24CF58E881BEDB7B1FF48310F25816AE945EB291E7789D82CB50
                            APIs
                            • GetForegroundWindow.USER32(00000000,?), ref: 00744A3D
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0077DA8E
                            • IsIconic.USER32(?), ref: 0077DA97
                            • ShowWindow.USER32(?,00000009), ref: 0077DAA4
                            • SetForegroundWindow.USER32(?), ref: 0077DAAE
                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0077DAC4
                            • GetCurrentThreadId.KERNEL32 ref: 0077DACB
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0077DAD7
                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0077DAE8
                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0077DAF0
                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 0077DAF8
                            • SetForegroundWindow.USER32(?), ref: 0077DAFB
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0077DB10
                            • keybd_event.USER32(00000012,00000000), ref: 0077DB1B
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0077DB25
                            • keybd_event.USER32(00000012,00000000), ref: 0077DB2A
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0077DB33
                            • keybd_event.USER32(00000012,00000000), ref: 0077DB38
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0077DB42
                            • keybd_event.USER32(00000012,00000000), ref: 0077DB47
                            • SetForegroundWindow.USER32(?), ref: 0077DB4A
                            • AttachThreadInput.USER32(?,?,00000000), ref: 0077DB71
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                            • String ID: Shell_TrayWnd
                            • API String ID: 4125248594-2988720461
                            • Opcode ID: f6f63200a8b8247e6408078fabb968244d8ca2fa23515ab5fac8f4659a2507d5
                            • Instruction ID: 6d6aafa95d94b871c097172f7066e760d67eb106484c19cfdf4cf140806a0467
                            • Opcode Fuzzy Hash: f6f63200a8b8247e6408078fabb968244d8ca2fa23515ab5fac8f4659a2507d5
                            • Instruction Fuzzy Hash: 01314171A40318BAEF316FA19C49F7E3F7DEF44B90F118029FA04A61D0C6B85D10AAA4
                            APIs
                              • Part of subcall function 00798CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00798D0D
                              • Part of subcall function 00798CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00798D3A
                              • Part of subcall function 00798CC3: GetLastError.KERNEL32 ref: 00798D47
                            • _memset.LIBCMT ref: 0079889B
                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 007988ED
                            • CloseHandle.KERNEL32(?), ref: 007988FE
                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00798915
                            • GetProcessWindowStation.USER32 ref: 0079892E
                            • SetProcessWindowStation.USER32(00000000), ref: 00798938
                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00798952
                              • Part of subcall function 00798713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00798851), ref: 00798728
                              • Part of subcall function 00798713: CloseHandle.KERNEL32(?,?,00798851), ref: 0079873A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                            • String ID: $default$winsta0
                            • API String ID: 2063423040-1027155976
                            • Opcode ID: 7f92384c20f1ff000daa677252bf508d4b43420430b8eff7e10a27b49176d1da
                            • Instruction ID: 97868a16d5041cd2fdeebae4d93fa7148e1d3224f58ba919dfefb0b004f64d07
                            • Opcode Fuzzy Hash: 7f92384c20f1ff000daa677252bf508d4b43420430b8eff7e10a27b49176d1da
                            • Instruction Fuzzy Hash: 7D816B71900209AFDF51DFA4EC49EEE7BB9EF05314F08816AF910B6261DB398E14DB61
                            APIs
                            • OpenClipboard.USER32(007CF910), ref: 007B4284
                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 007B4292
                            • GetClipboardData.USER32(0000000D), ref: 007B429A
                            • CloseClipboard.USER32 ref: 007B42A6
                            • GlobalLock.KERNEL32(00000000), ref: 007B42C2
                            • CloseClipboard.USER32 ref: 007B42CC
                            • GlobalUnlock.KERNEL32(00000000,00000000), ref: 007B42E1
                            • IsClipboardFormatAvailable.USER32(00000001), ref: 007B42EE
                            • GetClipboardData.USER32(00000001), ref: 007B42F6
                            • GlobalLock.KERNEL32(00000000), ref: 007B4303
                            • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 007B4337
                            • CloseClipboard.USER32 ref: 007B4447
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                            • String ID:
                            • API String ID: 3222323430-0
                            • Opcode ID: a40044d86857dd0bf581310e82da6512ba81ade6190d72997a307fa160a7f621
                            • Instruction ID: df8f51ab2f1d6061a0b28c7d2ea4d4b8c4195883e1ebf16076063392dc2c3f41
                            • Opcode Fuzzy Hash: a40044d86857dd0bf581310e82da6512ba81ade6190d72997a307fa160a7f621
                            • Instruction Fuzzy Hash: 75518371204301ABD711EF64EC89FAE77A9AF44B01F10852DF596D21A2DF78D904CB66
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 007AC9F8
                            • FindClose.KERNEL32(00000000), ref: 007ACA4C
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007ACA71
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007ACA88
                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 007ACAAF
                            • __swprintf.LIBCMT ref: 007ACAFB
                            • __swprintf.LIBCMT ref: 007ACB3E
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                            • __swprintf.LIBCMT ref: 007ACB92
                              • Part of subcall function 007638D8: __woutput_l.LIBCMT ref: 00763931
                            • __swprintf.LIBCMT ref: 007ACBE0
                              • Part of subcall function 007638D8: __flsbuf.LIBCMT ref: 00763953
                              • Part of subcall function 007638D8: __flsbuf.LIBCMT ref: 0076396B
                            • __swprintf.LIBCMT ref: 007ACC2F
                            • __swprintf.LIBCMT ref: 007ACC7E
                            • __swprintf.LIBCMT ref: 007ACCCD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                            • API String ID: 3953360268-2428617273
                            • Opcode ID: 578ab1df48215cb02efea6df9600cb8c3843d654fbfcf201fee30cc8831e1794
                            • Instruction ID: 3f0b56185a9f89e8de69deb7256f62108f8b8891c7e7f012151c28695021bf13
                            • Opcode Fuzzy Hash: 578ab1df48215cb02efea6df9600cb8c3843d654fbfcf201fee30cc8831e1794
                            • Instruction Fuzzy Hash: FAA1FDB1508305EBC714EB64C88ADAFB7ECEF95700F404919F686D7191EB38DA09CB62
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 007AF221
                            • _wcscmp.LIBCMT ref: 007AF236
                            • _wcscmp.LIBCMT ref: 007AF24D
                            • GetFileAttributesW.KERNEL32(?), ref: 007AF25F
                            • SetFileAttributesW.KERNEL32(?,?), ref: 007AF279
                            • FindNextFileW.KERNEL32(00000000,?), ref: 007AF291
                            • FindClose.KERNEL32(00000000), ref: 007AF29C
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 007AF2B8
                            • _wcscmp.LIBCMT ref: 007AF2DF
                            • _wcscmp.LIBCMT ref: 007AF2F6
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 007AF308
                            • SetCurrentDirectoryW.KERNEL32(007FA5A0), ref: 007AF326
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 007AF330
                            • FindClose.KERNEL32(00000000), ref: 007AF33D
                            • FindClose.KERNEL32(00000000), ref: 007AF34F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                            • String ID: *.*
                            • API String ID: 1803514871-438819550
                            • Opcode ID: 7c0a2da5612747de0adc66a228d914dacf95d1e7318bef0bab8190625b6e2afd
                            • Instruction ID: 1851c8d5babab9318ec505238b7f1fb6db7a2a208509cc22fb276e21ee9b4217
                            • Opcode Fuzzy Hash: 7c0a2da5612747de0adc66a228d914dacf95d1e7318bef0bab8190625b6e2afd
                            • Instruction Fuzzy Hash: A431C3B65002196ADF10DBF4DC88EEE73ACAF8A361F104279E905D3090EB38DE45CA54
                            APIs
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C0BDE
                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,007CF910,00000000,?,00000000,?,?), ref: 007C0C4C
                            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 007C0C94
                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 007C0D1D
                            • RegCloseKey.ADVAPI32(?), ref: 007C103D
                            • RegCloseKey.ADVAPI32(00000000), ref: 007C104A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Close$ConnectCreateRegistryValue
                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                            • API String ID: 536824911-966354055
                            • Opcode ID: 8fd4cfc3c04612a658fc1df18529f1395c7b9d3f365ec62ae6028502dc107531
                            • Instruction ID: 1abc9cb66e1b594668df6643b242b1e73f2b71009483b42779e6c855feec1b37
                            • Opcode Fuzzy Hash: 8fd4cfc3c04612a658fc1df18529f1395c7b9d3f365ec62ae6028502dc107531
                            • Instruction Fuzzy Hash: 2F023975200651DFCB14EF24C885E2AB7E5EF89714F04896DF98A9B362DB38ED41CB81
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 007AF37E
                            • _wcscmp.LIBCMT ref: 007AF393
                            • _wcscmp.LIBCMT ref: 007AF3AA
                              • Part of subcall function 007A45C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007A45DC
                            • FindNextFileW.KERNEL32(00000000,?), ref: 007AF3D9
                            • FindClose.KERNEL32(00000000), ref: 007AF3E4
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 007AF400
                            • _wcscmp.LIBCMT ref: 007AF427
                            • _wcscmp.LIBCMT ref: 007AF43E
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 007AF450
                            • SetCurrentDirectoryW.KERNEL32(007FA5A0), ref: 007AF46E
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 007AF478
                            • FindClose.KERNEL32(00000000), ref: 007AF485
                            • FindClose.KERNEL32(00000000), ref: 007AF497
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                            • String ID: *.*
                            • API String ID: 1824444939-438819550
                            • Opcode ID: 61c5a8f3bdc7c6c670919affcaed963c07c65236fc284cd2f375ac7e907678a2
                            • Instruction ID: c30a10736f4666d54d22544af4b4e8da5e0fcf75c1f58755723b01840362da13
                            • Opcode Fuzzy Hash: 61c5a8f3bdc7c6c670919affcaed963c07c65236fc284cd2f375ac7e907678a2
                            • Instruction Fuzzy Hash: 9431D5715012596ECF109BA4EC88EEE77AD9F8A361F104379E814A31A0DB3CDE44CA64
                            APIs
                              • Part of subcall function 0079874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00798766
                              • Part of subcall function 0079874A: GetLastError.KERNEL32(?,0079822A,?,?,?), ref: 00798770
                              • Part of subcall function 0079874A: GetProcessHeap.KERNEL32(00000008,?,?,0079822A,?,?,?), ref: 0079877F
                              • Part of subcall function 0079874A: HeapAlloc.KERNEL32(00000000,?,0079822A,?,?,?), ref: 00798786
                              • Part of subcall function 0079874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0079879D
                              • Part of subcall function 007987E7: GetProcessHeap.KERNEL32(00000008,00798240,00000000,00000000,?,00798240,?), ref: 007987F3
                              • Part of subcall function 007987E7: HeapAlloc.KERNEL32(00000000,?,00798240,?), ref: 007987FA
                              • Part of subcall function 007987E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00798240,?), ref: 0079880B
                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0079825B
                            • _memset.LIBCMT ref: 00798270
                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0079828F
                            • GetLengthSid.ADVAPI32(?), ref: 007982A0
                            • GetAce.ADVAPI32(?,00000000,?), ref: 007982DD
                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007982F9
                            • GetLengthSid.ADVAPI32(?), ref: 00798316
                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00798325
                            • HeapAlloc.KERNEL32(00000000), ref: 0079832C
                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0079834D
                            • CopySid.ADVAPI32(00000000), ref: 00798354
                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00798385
                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007983AB
                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007983BF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                            • String ID:
                            • API String ID: 3996160137-0
                            • Opcode ID: 825f2407e1c9cb99342158d357c493feabffb7fb1556399f424470dafdf3257b
                            • Instruction ID: 7a5116eb561cbd34984838952514d343cd861b64476dc9dca586f4a549858d6b
                            • Opcode Fuzzy Hash: 825f2407e1c9cb99342158d357c493feabffb7fb1556399f424470dafdf3257b
                            • Instruction Fuzzy Hash: 61613971904209EFDF00DFA4EC85EAEBBB9FF05700F14816AE815A6291DB399A05CB61
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oau$PJ~$UCP)$UTF)$UTF16)
                            • API String ID: 0-828581819
                            • Opcode ID: 7eb3373821aafb5da998f88982cebc285664450ac29c808f77a059cb354472b2
                            • Instruction ID: 8938c6d6f51021ab549feb54e2042aaa3f729f2c5e5a16bbeee3e608de97305b
                            • Opcode Fuzzy Hash: 7eb3373821aafb5da998f88982cebc285664450ac29c808f77a059cb354472b2
                            • Instruction Fuzzy Hash: FE727F75E0021ADBDF24CF58D8807EEB7B5EF48310F54816AE949EB290EB789D45CB90
                            APIs
                              • Part of subcall function 007C10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C0038,?,?), ref: 007C10BC
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C0737
                              • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                              • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 007C07D6
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 007C086E
                            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 007C0AAD
                            • RegCloseKey.ADVAPI32(00000000), ref: 007C0ABA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                            • String ID:
                            • API String ID: 1240663315-0
                            • Opcode ID: c9f6ae12a98b28799d9628b0b3d9bf4a02f18d876e45c97ab4c3f04deb747917
                            • Instruction ID: 430a941068353ad6dad19057d7b350e8f589e277640d0a7c0475f2b806a835a4
                            • Opcode Fuzzy Hash: c9f6ae12a98b28799d9628b0b3d9bf4a02f18d876e45c97ab4c3f04deb747917
                            • Instruction Fuzzy Hash: EDE13C71204210EFCB14DF24C895E6BBBE9EF89714B04C56DF84ADB2A2DB34E905CB91
                            APIs
                            • GetKeyboardState.USER32(?), ref: 007A0241
                            • GetAsyncKeyState.USER32(000000A0), ref: 007A02C2
                            • GetKeyState.USER32(000000A0), ref: 007A02DD
                            • GetAsyncKeyState.USER32(000000A1), ref: 007A02F7
                            • GetKeyState.USER32(000000A1), ref: 007A030C
                            • GetAsyncKeyState.USER32(00000011), ref: 007A0324
                            • GetKeyState.USER32(00000011), ref: 007A0336
                            • GetAsyncKeyState.USER32(00000012), ref: 007A034E
                            • GetKeyState.USER32(00000012), ref: 007A0360
                            • GetAsyncKeyState.USER32(0000005B), ref: 007A0378
                            • GetKeyState.USER32(0000005B), ref: 007A038A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: State$Async$Keyboard
                            • String ID:
                            • API String ID: 541375521-0
                            • Opcode ID: 36d6833821de6db8375f75e7e740a92c678bb9a9ef9577e98ca23561f475842d
                            • Instruction ID: 25c5fe31ef890036561ca30a251d0a0f38243889afba7e1b0718aa5fe845dd15
                            • Opcode Fuzzy Hash: 36d6833821de6db8375f75e7e740a92c678bb9a9ef9577e98ca23561f475842d
                            • Instruction Fuzzy Hash: 2041C9345047C96EFF318B6498087A5BEA17F93340F088A9DD6C6461C2E79D99D887E2
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                            • String ID:
                            • API String ID: 1737998785-0
                            • Opcode ID: 26d156c9d61f971ae334436a9fc10025f19ae7fa520cedcaf5151d53330ec9ca
                            • Instruction ID: e8012865574ce5fb7efda2e0a6e7f489e0ae59fa5fa9bcab6764ffe5884be503
                            • Opcode Fuzzy Hash: 26d156c9d61f971ae334436a9fc10025f19ae7fa520cedcaf5151d53330ec9ca
                            • Instruction Fuzzy Hash: 65213D352006109FDB10AF64EC49FAE77A9EF44711F14C02AF946EB2A2DB78AD11CB59
                            APIs
                              • Part of subcall function 007448AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007448A1,?,?,007437C0,?), ref: 007448CE
                              • Part of subcall function 007A4CD3: GetFileAttributesW.KERNEL32(?,007A3947), ref: 007A4CD4
                            • FindFirstFileW.KERNEL32(?,?), ref: 007A3ADF
                            • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 007A3B87
                            • MoveFileW.KERNEL32(?,?), ref: 007A3B9A
                            • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 007A3BB7
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 007A3BD9
                            • FindClose.KERNEL32(00000000,?,?,?,?), ref: 007A3BF5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                            • String ID: \*.*
                            • API String ID: 4002782344-1173974218
                            • Opcode ID: e3b1f6c3d44ff7bc63af925c3646f38543e8112660430b498dd46de90d0ef6ee
                            • Instruction ID: 5186b8ff125b3cfda5e67ae8d447d7e8c5a1ceb368ee4ecbeddc4d99493ca17f
                            • Opcode Fuzzy Hash: e3b1f6c3d44ff7bc63af925c3646f38543e8112660430b498dd46de90d0ef6ee
                            • Instruction Fuzzy Hash: 16517E31801158EBCF05EFA0CD969EDB779AF56300F648269F44677092DF296F09CB60
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID: ERCP$Oau$VUUU$VUUU$VUUU$VUUU
                            • API String ID: 0-2652741529
                            • Opcode ID: 5f3f6c77e567cdb688c0e5948db6eb84e93a17e89d24c8752c2b1414d749f673
                            • Instruction ID: 3f9f82d57e7566dc4c831d7c593feb0fc5e74e6cfdb429290712b0723367bc37
                            • Opcode Fuzzy Hash: 5f3f6c77e567cdb688c0e5948db6eb84e93a17e89d24c8752c2b1414d749f673
                            • Instruction Fuzzy Hash: 77A28E70E0421ACBDF28DF58C9847EDB7B1FB54319F2481A9D816A7240E7789EC9CB51
                            APIs
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                            • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 007AF6AB
                            • Sleep.KERNEL32(0000000A), ref: 007AF6DB
                            • _wcscmp.LIBCMT ref: 007AF6EF
                            • _wcscmp.LIBCMT ref: 007AF70A
                            • FindNextFileW.KERNEL32(?,?), ref: 007AF7A8
                            • FindClose.KERNEL32(00000000), ref: 007AF7BE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                            • String ID: *.*
                            • API String ID: 713712311-438819550
                            • Opcode ID: 0185bebe045492b58d2dd87f74bc1b1b8f81b656da70b4edf2cd560b33173346
                            • Instruction ID: 72b18a5cfe36b742d8c628923a1b4fa24a32d24104f084aa7b81291bd904d0f4
                            • Opcode Fuzzy Hash: 0185bebe045492b58d2dd87f74bc1b1b8f81b656da70b4edf2cd560b33173346
                            • Instruction Fuzzy Hash: 3C418F7190021AEBCF55DFA4CC89EEEBBB4FF46310F54466AE815A3190DB389E44CB90
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID:
                            • API String ID: 4104443479-0
                            • Opcode ID: 88d67dcf831d25bb41b18419ec2f037ec78e84dd95e5d97c649585ca9a1985ad
                            • Instruction ID: 88d1c893a28e6f474c448d61516331dccd26dfa66cc6512e446af960c4b7a544
                            • Opcode Fuzzy Hash: 88d67dcf831d25bb41b18419ec2f037ec78e84dd95e5d97c649585ca9a1985ad
                            • Instruction Fuzzy Hash: 121279B0A00609DFDF14DFA4D999AEEB7B5FF48300F108569E806E7251EB39AD15CB90
                            APIs
                              • Part of subcall function 00760FF6: std::exception::exception.LIBCMT ref: 0076102C
                              • Part of subcall function 00760FF6: __CxxThrowException@8.LIBCMT ref: 00761041
                            • _memmove.LIBCMT ref: 0079062F
                            • _memmove.LIBCMT ref: 00790744
                            • _memmove.LIBCMT ref: 007907EB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memmove$Exception@8Throwstd::exception::exception
                            • String ID: yZu
                            • API String ID: 1300846289-3294280352
                            • Opcode ID: c203e9e4249d50b5713c8c4d1d683c529da2c21b1032c62c448f485c63e0299b
                            • Instruction ID: 5fdbec23ce7a997667bdc3321a75f53a57752740ef828a06e25ded1992da6de6
                            • Opcode Fuzzy Hash: c203e9e4249d50b5713c8c4d1d683c529da2c21b1032c62c448f485c63e0299b
                            • Instruction Fuzzy Hash: 8C02A0B0A00209DFCF04DF64E995AAEBBB5FF44310F148069E806DB255EB39EA55CB91
                            APIs
                              • Part of subcall function 00798CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00798D0D
                              • Part of subcall function 00798CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00798D3A
                              • Part of subcall function 00798CC3: GetLastError.KERNEL32 ref: 00798D47
                            • ExitWindowsEx.USER32(?,00000000), ref: 007A549B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                            • String ID: $@$SeShutdownPrivilege
                            • API String ID: 2234035333-194228
                            • Opcode ID: 8c4df0c346a7cc737aca7b3b65d5c81ab257af56197c5279bca91a0f5f7fba48
                            • Instruction ID: 7a7d261430ec0b439bb53d3660d13f01c10fad02283f5237d7836b7b66bdc5b4
                            • Opcode Fuzzy Hash: 8c4df0c346a7cc737aca7b3b65d5c81ab257af56197c5279bca91a0f5f7fba48
                            • Instruction Fuzzy Hash: 7A014771655A416AEB685674EC4AFBA7358EB8B353F200324FD06D20C2DA5C0C8081A0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __itow__swprintf
                            • String ID: Oau
                            • API String ID: 674341424-3624848570
                            • Opcode ID: aa1a44e8e46a1c7331ce29e70841f53e47b79311bd3acdf3bcd1a5b8ef0a0b39
                            • Instruction ID: 9ec0dcfaf0d36b07c6da4fbd8e56d1f01344ed74da70a0137a9cf4d95205ed88
                            • Opcode Fuzzy Hash: aa1a44e8e46a1c7331ce29e70841f53e47b79311bd3acdf3bcd1a5b8ef0a0b39
                            • Instruction Fuzzy Hash: 19229D71608341DFC724DF24C895BABB7E4BF84350F10491DF996972A1EB78EA08CB92
                            APIs
                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 007B65EF
                            • WSAGetLastError.WSOCK32(00000000), ref: 007B65FE
                            • bind.WSOCK32(00000000,?,00000010), ref: 007B661A
                            • listen.WSOCK32(00000000,00000005), ref: 007B6629
                            • WSAGetLastError.WSOCK32(00000000), ref: 007B6643
                            • closesocket.WSOCK32(00000000,00000000), ref: 007B6657
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorLast$bindclosesocketlistensocket
                            • String ID:
                            • API String ID: 1279440585-0
                            • Opcode ID: ba1967801d82b8acbd52389f3333c5d6114a50f74fff4cf13736dc6ad54b7f78
                            • Instruction ID: 4b305ec236ba196aadf7623aadcf3807e9d8e1c85f920d9c550f8ed3e6d4b23d
                            • Opcode Fuzzy Hash: ba1967801d82b8acbd52389f3333c5d6114a50f74fff4cf13736dc6ad54b7f78
                            • Instruction Fuzzy Hash: 47217C31600204DFCB10AF64D889FAEB7EAEF49724F148169EA56E73D1CB78AD01CB55
                            APIs
                              • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 007419FA
                            • GetSysColor.USER32(0000000F), ref: 00741A4E
                            • SetBkColor.GDI32(?,00000000), ref: 00741A61
                              • Part of subcall function 00741290: DefDlgProcW.USER32(?,00000020,?), ref: 007412D8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ColorProc$LongWindow
                            • String ID:
                            • API String ID: 3744519093-0
                            • Opcode ID: a5ed0ef7f5ec98af736198e9d8196bb1de4cfca0be38198b5d615b61775f591a
                            • Instruction ID: 0b0fd535224a1e66a31db8895c95b03ccf46ef4ada78e9d9aedb83e9d38278fe
                            • Opcode Fuzzy Hash: a5ed0ef7f5ec98af736198e9d8196bb1de4cfca0be38198b5d615b61775f591a
                            • Instruction Fuzzy Hash: 09A158B0201584FADA29BF384C48F7B2B9DEB46385B94C11DF406D6192DB2C9C919276
                            APIs
                              • Part of subcall function 007B80A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 007B80CB
                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 007B6AB1
                            • WSAGetLastError.WSOCK32(00000000), ref: 007B6ADA
                            • bind.WSOCK32(00000000,?,00000010), ref: 007B6B13
                            • WSAGetLastError.WSOCK32(00000000), ref: 007B6B20
                            • closesocket.WSOCK32(00000000,00000000), ref: 007B6B34
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorLast$bindclosesocketinet_addrsocket
                            • String ID:
                            • API String ID: 99427753-0
                            • Opcode ID: a6c754acc2ac316861548928b889f8c2fa471eac9558357fe69142fdf15e6a5b
                            • Instruction ID: 0c4c867d79b0eefbde4d6a94ee09de14a3594569990adc1017904d9b3dfb1dc1
                            • Opcode Fuzzy Hash: a6c754acc2ac316861548928b889f8c2fa471eac9558357fe69142fdf15e6a5b
                            • Instruction Fuzzy Hash: EB417E75700214EFEB10BF649C8AF6E77A99B45720F448058FA5AAB3D2DB789D008691
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                            • String ID:
                            • API String ID: 292994002-0
                            • Opcode ID: 140a92efc43be40db478ff6a29c16f83e7a9988de1c35b4242d8371163d2afd5
                            • Instruction ID: c4bbe2a80e96dcb1e10a8bc81a8b98e86bb9c3194e7e2776cba25c3b77927672
                            • Opcode Fuzzy Hash: 140a92efc43be40db478ff6a29c16f83e7a9988de1c35b4242d8371163d2afd5
                            • Instruction Fuzzy Hash: CB11B231300910AFE7215F26DC48F6BBB99EF44B21B84842DE946E7241CB79E941CAA9
                            APIs
                            • CoInitialize.OLE32(00000000), ref: 007AC69D
                            • CoCreateInstance.OLE32(007D2D6C,00000000,00000001,007D2BDC,?), ref: 007AC6B5
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                            • CoUninitialize.OLE32 ref: 007AC922
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CreateInitializeInstanceUninitialize_memmove
                            • String ID: .lnk
                            • API String ID: 2683427295-24824748
                            • Opcode ID: 2c68bb657e5e4107f7877fca9d238abb07345d9ef46132750cd2b3cc20162c9c
                            • Instruction ID: 50cb91705493097955be46c96ee3c48da8f948fad694a51357af1eafe80a696f
                            • Opcode Fuzzy Hash: 2c68bb657e5e4107f7877fca9d238abb07345d9ef46132750cd2b3cc20162c9c
                            • Instruction Fuzzy Hash: A2A13E71208205EFD700EF54C885EABB7ECEF95704F008A1DF196972A2DB74EA49CB52
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00781D88,?), ref: 007BC312
                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 007BC324
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: GetSystemWow64DirectoryW$kernel32.dll
                            • API String ID: 2574300362-1816364905
                            • Opcode ID: 1e5736c0d3b2a4bb48118da35fa1befb5cf805b74021a6e7ae4659a868d20d51
                            • Instruction ID: deaebaca336543427d2e08b5bf3be2947bc5f23e8473ca85016439de9ea353f1
                            • Opcode Fuzzy Hash: 1e5736c0d3b2a4bb48118da35fa1befb5cf805b74021a6e7ae4659a868d20d51
                            • Instruction Fuzzy Hash: 7BE0B6B4600716CFDB214B25D804B9676D5AB48755B84C43DE896D6250E778D8408A61
                            APIs
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 007BF151
                            • Process32FirstW.KERNEL32(00000000,?), ref: 007BF15F
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                            • Process32NextW.KERNEL32(00000000,?), ref: 007BF21F
                            • CloseHandle.KERNEL32(00000000,?,?,?), ref: 007BF22E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                            • String ID:
                            • API String ID: 2576544623-0
                            • Opcode ID: 6df03e8e0c7a7aab9178f7693af757160818edf7b30e081a6ef33b283f7ceff3
                            • Instruction ID: 1c709f57f29b0d000549c9530a826c526c2c8c2e351db68725f108c7f0fa6734
                            • Opcode Fuzzy Hash: 6df03e8e0c7a7aab9178f7693af757160818edf7b30e081a6ef33b283f7ceff3
                            • Instruction Fuzzy Hash: 4E516B71504314EFD310EF24DC89EABBBE8BF98710F14492DF59597291EB74A908CB92
                            APIs
                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0079EB19
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: lstrlen
                            • String ID: ($|
                            • API String ID: 1659193697-1631851259
                            • Opcode ID: 30315b23207829696b41f3028ea452342d03b2ce67163b91cfc4e895c0c308e5
                            • Instruction ID: bd409ae80303ec2e621a2589b90dad340909eb2474cbb81bca4991741fc9246f
                            • Opcode Fuzzy Hash: 30315b23207829696b41f3028ea452342d03b2ce67163b91cfc4e895c0c308e5
                            • Instruction Fuzzy Hash: D23236B5A00605DFDB28CF19D481A6AB7F1FF48320B15C56EE89ADB3A1E774E941CB40
                            APIs
                            • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 007B26D5
                            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 007B270C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Internet$AvailableDataFileQueryRead
                            • String ID:
                            • API String ID: 599397726-0
                            • Opcode ID: 3d49dbcf35ed672594f7ffa0607d0f74b2259b31b7b5aef5e57da9c7530ca2a6
                            • Instruction ID: 62fd4c0d3a47cb6361264c16430bdab05d1b0d538a06e107925f261b81198b10
                            • Opcode Fuzzy Hash: 3d49dbcf35ed672594f7ffa0607d0f74b2259b31b7b5aef5e57da9c7530ca2a6
                            • Instruction Fuzzy Hash: D641D671501209FFEB20DE54DC89FFBB7BCEB40718F10406EFA05A6542EE799E429658
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 007AB5AE
                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 007AB608
                            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 007AB655
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorMode$DiskFreeSpace
                            • String ID:
                            • API String ID: 1682464887-0
                            • Opcode ID: 84bc575c5ba98a27f64e4daefad1881b0d040fb7c156f6b527526fa95be58c8b
                            • Instruction ID: 68323b8fb0014ecba352cdd3fde301e05242555e06e69c8818d2098fe94504ff
                            • Opcode Fuzzy Hash: 84bc575c5ba98a27f64e4daefad1881b0d040fb7c156f6b527526fa95be58c8b
                            • Instruction Fuzzy Hash: 81217F35A00118EFCB00EFA5D884EEEBBB8FF89310F1481A9E905AB351DB35A915CB55
                            APIs
                              • Part of subcall function 00760FF6: std::exception::exception.LIBCMT ref: 0076102C
                              • Part of subcall function 00760FF6: __CxxThrowException@8.LIBCMT ref: 00761041
                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00798D0D
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00798D3A
                            • GetLastError.KERNEL32 ref: 00798D47
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                            • String ID:
                            • API String ID: 1922334811-0
                            • Opcode ID: 5bc9b8472dd10c022519dee91c4b1f8b5fcce2e83dff9b3fe2c40ba179164d68
                            • Instruction ID: 093ccb15dae17cab51befa49b13e2a92cdc828607a39eed71c16da7dd69748f2
                            • Opcode Fuzzy Hash: 5bc9b8472dd10c022519dee91c4b1f8b5fcce2e83dff9b3fe2c40ba179164d68
                            • Instruction Fuzzy Hash: 6C1191B2514209AFDB28EF54EC89D6BB7BDFB45710B24852EF85693241EB34AC408A64
                            APIs
                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007A404B
                            • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 007A4088
                            • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007A4091
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseControlCreateDeviceFileHandle
                            • String ID:
                            • API String ID: 33631002-0
                            • Opcode ID: 4ca2532246beffbc8c46c75741045fd2cb72509ef5deb3c3a46d1ea8d0ece57e
                            • Instruction ID: 3c3bd1fa421ddb86ec007861dac7c5ce8354dc97757a874472d95d31b061640a
                            • Opcode Fuzzy Hash: 4ca2532246beffbc8c46c75741045fd2cb72509ef5deb3c3a46d1ea8d0ece57e
                            • Instruction Fuzzy Hash: 341186B2D00228BEE7109BE8DC44FAFBBBCEB89710F004656FA04E7191C2B95D0547A1
                            APIs
                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 007A4C2C
                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007A4C43
                            • FreeSid.ADVAPI32(?), ref: 007A4C53
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AllocateCheckFreeInitializeMembershipToken
                            • String ID:
                            • API String ID: 3429775523-0
                            • Opcode ID: 7f03769212c986dfa753919224f7f494ec9a13f08c24ce1be1e6f5273c7ba2c0
                            • Instruction ID: dd1cc1d49bf33f51485d5607ba52f86591f80f2857c47c6046bbeb0a0934ec9d
                            • Opcode Fuzzy Hash: 7f03769212c986dfa753919224f7f494ec9a13f08c24ce1be1e6f5273c7ba2c0
                            • Instruction Fuzzy Hash: BEF03775A51208BBDB04DFE09C89EAEBBB9EB08611F0084A9E901E2181E6756A448B54
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 203cb0b6266cbdc23aee3d53e569d44121c28e29b1a60965c2653d2153ff8b30
                            • Instruction ID: 70d0668677e76e142a60bd4687cc26161ad2b4123a884a0cfea8b9ce3a187ac2
                            • Opcode Fuzzy Hash: 203cb0b6266cbdc23aee3d53e569d44121c28e29b1a60965c2653d2153ff8b30
                            • Instruction Fuzzy Hash: 1C22AFB0A00219DFDB24DF58C484ABEBBF1FF04320F148569E856AB351E778AD85CB91
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 007AC966
                            • FindClose.KERNEL32(00000000), ref: 007AC996
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID:
                            • API String ID: 2295610775-0
                            • Opcode ID: fe7c5964ab899ecfb3eac458647d0741e0df20e8d6523bcc80170e0d36a8793c
                            • Instruction ID: 9f77f0aae07b5d336d5dcc7187c6df8645d068d5d3d03d6bc487e38689a42c96
                            • Opcode Fuzzy Hash: fe7c5964ab899ecfb3eac458647d0741e0df20e8d6523bcc80170e0d36a8793c
                            • Instruction Fuzzy Hash: 5F1130716106009FDB109F29D849A6AB7E9EF85324F00C65EF9A5D7291DB34A800CB81
                            APIs
                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,007B977D,?,007CFB84,?), ref: 007AA302
                            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,007B977D,?,007CFB84,?), ref: 007AA314
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorFormatLastMessage
                            • String ID:
                            • API String ID: 3479602957-0
                            • Opcode ID: 48b9150fea03afe4c97970d640958752987032ffb0291b8d6728b19ae104f187
                            • Instruction ID: 019871d0868436c68abcc074d4ad61b35bf2609a125129b8caa9f0b11049cf88
                            • Opcode Fuzzy Hash: 48b9150fea03afe4c97970d640958752987032ffb0291b8d6728b19ae104f187
                            • Instruction Fuzzy Hash: EAF0823554422DFBDB10AFA4CC49FEA776DBF09761F008269F908D6191D7349944CBA1
                            APIs
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00798851), ref: 00798728
                            • CloseHandle.KERNEL32(?,?,00798851), ref: 0079873A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AdjustCloseHandlePrivilegesToken
                            • String ID:
                            • API String ID: 81990902-0
                            • Opcode ID: de31652ac400e3228699b8652d56821050f07396a4ccfcdc574494fdf8aec851
                            • Instruction ID: c2517ee7ad2bc89fa6cfaf050340d0fbf523cf2e9cd35163189c2f0d6bde299d
                            • Opcode Fuzzy Hash: de31652ac400e3228699b8652d56821050f07396a4ccfcdc574494fdf8aec851
                            • Instruction Fuzzy Hash: D1E0B676010A50EEEB252B60FD09D777BAAEB04750724882EF89780470DB66AC90DB50
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00768F97,?,?,?,00000001), ref: 0076A39A
                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0076A3A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: eb374efd2ab099b5b5b5a2ea54dd17004bfcdd9d8d0be2b8f05e308f435f587c
                            • Instruction ID: 1efdfeaed302e4e85d56b87a2c369ea146a2e9ada2255a515f359cda565f44b8
                            • Opcode Fuzzy Hash: eb374efd2ab099b5b5b5a2ea54dd17004bfcdd9d8d0be2b8f05e308f435f587c
                            • Instruction Fuzzy Hash: 71B09231054248BBCA002B91EC09F883F6AEB84AA2F408024FA0D84060CB6656508A99
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a5cadebd90fc2fbabad9aa6d12599aae8107fc19f19ba3a26e7c1118e6dba045
                            • Instruction ID: e52a4035309c5b7feb31acd5e6cbb7dd24b024b498af72e6ffcf9e8f3ea58c5e
                            • Opcode Fuzzy Hash: a5cadebd90fc2fbabad9aa6d12599aae8107fc19f19ba3a26e7c1118e6dba045
                            • Instruction Fuzzy Hash: 0D321162D6AF414DD7279634E832336A359AFB73C4F14D737EC1AB5AA6EB2C84834104
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b2f14b989d895f1311f04826bd12e6934cfd733a47e13ff5eae4593b2f757809
                            • Instruction ID: 36573127bc8c5a2481fab5395590ccc370bb4a0b1054ad857d36b84cc6b5a9d3
                            • Opcode Fuzzy Hash: b2f14b989d895f1311f04826bd12e6934cfd733a47e13ff5eae4593b2f757809
                            • Instruction Fuzzy Hash: E4B1EE20E2AF414DD62396398831336BB6CBFBB2C5F52D71BFC6A70D22EB2585834145
                            APIs
                            • __time64.LIBCMT ref: 007A8B25
                              • Part of subcall function 0076543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,007A91F8,00000000,?,?,?,?,007A93A9,00000000,?), ref: 00765443
                              • Part of subcall function 0076543A: __aulldiv.LIBCMT ref: 00765463
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Time$FileSystem__aulldiv__time64
                            • String ID:
                            • API String ID: 2893107130-0
                            • Opcode ID: ef67a3452057c95bd7d5dd4ffacb92ae36386042b3940868b84675d1ed0a5693
                            • Instruction ID: 4013ebf3063f7f57a04d746948ccc0ee6ecec45a73f354cc6dd9e6bbd4a286a4
                            • Opcode Fuzzy Hash: ef67a3452057c95bd7d5dd4ffacb92ae36386042b3940868b84675d1ed0a5693
                            • Instruction Fuzzy Hash: AE21A272625510CBC769CF29D841A52B3E1EBA5311B288F6CD1E5CB2D0CA74B945CB94
                            APIs
                            • BlockInput.USER32(00000001), ref: 007B4218
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: BlockInput
                            • String ID:
                            • API String ID: 3456056419-0
                            • Opcode ID: f2cc0d3bd1a1bea68cfd88fdae51b6199751f39f66c52a075cb4a8a758941be0
                            • Instruction ID: 12de7c0471ce8d0a96059018a51f4fa87ef2ec4fcc20e6a11b1196cfe45fc082
                            • Opcode Fuzzy Hash: f2cc0d3bd1a1bea68cfd88fdae51b6199751f39f66c52a075cb4a8a758941be0
                            • Instruction Fuzzy Hash: BDE01A712402149FC710AF69D844ADAB7E8AF94760F00802AF949D7352DA78A8408BA0
                            APIs
                            • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 007A4F18
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: mouse_event
                            • String ID:
                            • API String ID: 2434400541-0
                            • Opcode ID: 2987744be289acb8d0d37a2a180419dc074db3be1d53292170673c7e1a32d7a8
                            • Instruction ID: 239489e6d21ae195304163f82e3f0ba994c06e0975944492b55719c90d1bc188
                            • Opcode Fuzzy Hash: 2987744be289acb8d0d37a2a180419dc074db3be1d53292170673c7e1a32d7a8
                            • Instruction Fuzzy Hash: 14D05EB01A82057CFC184B24BC0FF760219E3C2781F8C6B897301854C1A9EF6810A034
                            APIs
                            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,007988D1), ref: 00798CB3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: LogonUser
                            • String ID:
                            • API String ID: 1244722697-0
                            • Opcode ID: 357a6effc7837a37eddde82521b948638138efe51363f29d99ebfb578964914b
                            • Instruction ID: e2be0ad7fb59c89ef222d8d3311767c868aa6837693dbdf2b5da42aad3d75db4
                            • Opcode Fuzzy Hash: 357a6effc7837a37eddde82521b948638138efe51363f29d99ebfb578964914b
                            • Instruction Fuzzy Hash: 48D05E3226090EABEF018EA4DC01EAE3B6AEB04B01F408111FE15C50A1C775D835AB60
                            APIs
                            • GetUserNameW.ADVAPI32(?,?), ref: 00782242
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: NameUser
                            • String ID:
                            • API String ID: 2645101109-0
                            • Opcode ID: a8edc0b613333c3a932d822b0bd87fd3e56164c23c41738b630274c091cbd3df
                            • Instruction ID: cbc941294e484c01850ff7ec752420d1570b35e7fa40f24ef55944a3037ddbc0
                            • Opcode Fuzzy Hash: a8edc0b613333c3a932d822b0bd87fd3e56164c23c41738b630274c091cbd3df
                            • Instruction Fuzzy Hash: 23C04CF1801109DBDB05DB90D988DFE77BDAB04304F104066E102F2100D7789B448B71
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0076A36A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 51a064a635f18a7d01f06f8ac7eeb017e60e8e2b6eb718a8223399692e5f06f4
                            • Instruction ID: 9f88c066652b19e7cd74d727de051b5f95aaf155ca7fc1d7ab21dcda763b6cd7
                            • Opcode Fuzzy Hash: 51a064a635f18a7d01f06f8ac7eeb017e60e8e2b6eb718a8223399692e5f06f4
                            • Instruction Fuzzy Hash: 6AA0113000020CBB8A002B82EC08888BFAEEA802A0B008020F80C800228B32AA208A88
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 353e30c706b744169c7195b447a1a9df8c431ce94646a5e248ffa0f17e790035
                            • Instruction ID: 89ac0b11bbdcac4f8f596c90480acb901e6df826864b4ff013bd605461c8a518
                            • Opcode Fuzzy Hash: 353e30c706b744169c7195b447a1a9df8c431ce94646a5e248ffa0f17e790035
                            • Instruction Fuzzy Hash: 88227B30501625CBDF69CF18D4846FD77A1FB41305F2484AADC52AB291EBBC9D89CB72
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                            • Instruction ID: 0b9d7878ca994be2eb05eb955308540c284d3de94be77ded40101ef9a76945ee
                            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                            • Instruction Fuzzy Hash: 07C1A23220649309DB6D4639D43407FBAE15BA27B135E0B5DECB3CB5C6EF28D525EA20
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                            • Instruction ID: e4a9875a3ce404c53b4dd954e51a2b0ee46eb2818a38733d0aa7e10e93977a38
                            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                            • Instruction Fuzzy Hash: 1EC1C43220659309DB6D463A843407FBBE15BA27B135E0B6DECB3DB4C5EF28D525E620
                            APIs
                            • DeleteObject.GDI32(00000000), ref: 007B7B70
                            • DeleteObject.GDI32(00000000), ref: 007B7B82
                            • DestroyWindow.USER32 ref: 007B7B90
                            • GetDesktopWindow.USER32 ref: 007B7BAA
                            • GetWindowRect.USER32(00000000), ref: 007B7BB1
                            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 007B7CF2
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 007B7D02
                            • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7D4A
                            • GetClientRect.USER32(00000000,?), ref: 007B7D56
                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 007B7D90
                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DB2
                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DC5
                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DD0
                            • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DD9
                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DE8
                            • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DF1
                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7DF8
                            • GlobalFree.KERNEL32(00000000), ref: 007B7E03
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7E15
                            • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,007D2CAC,00000000), ref: 007B7E2B
                            • GlobalFree.KERNEL32(00000000), ref: 007B7E3B
                            • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 007B7E61
                            • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 007B7E80
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B7EA2
                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007B808F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                            • String ID: $AutoIt v3$DISPLAY$static
                            • API String ID: 2211948467-2373415609
                            • Opcode ID: a8c036d92e496f8ae08aaa30baf464e7fdb716ec401d345ceaffe0fca23faa44
                            • Instruction ID: 48a40eb7d8ec8c51be7820e196f0ffdf710f4a3478a0510e123c3b312b0c49db
                            • Opcode Fuzzy Hash: a8c036d92e496f8ae08aaa30baf464e7fdb716ec401d345ceaffe0fca23faa44
                            • Instruction Fuzzy Hash: C1026B71900119EFDB14DFA4CC89EAE7BB9FB89310F14815DF905AB2A1DB78AD01CB64
                            APIs
                            • CharUpperBuffW.USER32(?,?,007CF910), ref: 007C38AF
                            • IsWindowVisible.USER32(?), ref: 007C38D3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: BuffCharUpperVisibleWindow
                            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                            • API String ID: 4105515805-45149045
                            • Opcode ID: 9b7ba9dd61c1c81088711cc63ed30c2775f87ad098cdecf9ab76bfdabf3f516d
                            • Instruction ID: e9a7300bc3e645b88299c8c130ac06e5ff38532234f7cbb9e2c95c7d0dd815fb
                            • Opcode Fuzzy Hash: 9b7ba9dd61c1c81088711cc63ed30c2775f87ad098cdecf9ab76bfdabf3f516d
                            • Instruction Fuzzy Hash: E6D14C70204305DBCB14EF24C459F6E77A5AF94344F10856CB9866B3A2DB3DEE0ACB92
                            APIs
                            • SetTextColor.GDI32(?,00000000), ref: 007CA89F
                            • GetSysColorBrush.USER32(0000000F), ref: 007CA8D0
                            • GetSysColor.USER32(0000000F), ref: 007CA8DC
                            • SetBkColor.GDI32(?,000000FF), ref: 007CA8F6
                            • SelectObject.GDI32(?,?), ref: 007CA905
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 007CA930
                            • GetSysColor.USER32(00000010), ref: 007CA938
                            • CreateSolidBrush.GDI32(00000000), ref: 007CA93F
                            • FrameRect.USER32(?,?,00000000), ref: 007CA94E
                            • DeleteObject.GDI32(00000000), ref: 007CA955
                            • InflateRect.USER32(?,000000FE,000000FE), ref: 007CA9A0
                            • FillRect.USER32(?,?,?), ref: 007CA9D2
                            • GetWindowLongW.USER32(?,000000F0), ref: 007CA9FD
                              • Part of subcall function 007CAB60: GetSysColor.USER32(00000012), ref: 007CAB99
                              • Part of subcall function 007CAB60: SetTextColor.GDI32(?,?), ref: 007CAB9D
                              • Part of subcall function 007CAB60: GetSysColorBrush.USER32(0000000F), ref: 007CABB3
                              • Part of subcall function 007CAB60: GetSysColor.USER32(0000000F), ref: 007CABBE
                              • Part of subcall function 007CAB60: GetSysColor.USER32(00000011), ref: 007CABDB
                              • Part of subcall function 007CAB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 007CABE9
                              • Part of subcall function 007CAB60: SelectObject.GDI32(?,00000000), ref: 007CABFA
                              • Part of subcall function 007CAB60: SetBkColor.GDI32(?,00000000), ref: 007CAC03
                              • Part of subcall function 007CAB60: SelectObject.GDI32(?,?), ref: 007CAC10
                              • Part of subcall function 007CAB60: InflateRect.USER32(?,000000FF,000000FF), ref: 007CAC2F
                              • Part of subcall function 007CAB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007CAC46
                              • Part of subcall function 007CAB60: GetWindowLongW.USER32(00000000,000000F0), ref: 007CAC5B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                            • String ID:
                            • API String ID: 4124339563-0
                            • Opcode ID: 24b2fd280e416046fbbb83cd933582752a44f45b7309d88f697892f34915aa19
                            • Instruction ID: 487becc615bbb2adcbc5dd4a522536d65745c28274cadc5cc6230f48d223bdba
                            • Opcode Fuzzy Hash: 24b2fd280e416046fbbb83cd933582752a44f45b7309d88f697892f34915aa19
                            • Instruction Fuzzy Hash: 32A17C72008305FFD7119F64DC08E6B7BAAFB88325F148A2DFA62D61A0D739D944CB56
                            APIs
                            • DestroyWindow.USER32(?,?,?), ref: 00742CA2
                            • DeleteObject.GDI32(00000000), ref: 00742CE8
                            • DeleteObject.GDI32(00000000), ref: 00742CF3
                            • DestroyIcon.USER32(00000000,?,?,?), ref: 00742CFE
                            • DestroyWindow.USER32(00000000,?,?,?), ref: 00742D09
                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0077C68B
                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0077C6C4
                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0077CAED
                              • Part of subcall function 00741B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00742036,?,00000000,?,?,?,?,007416CB,00000000,?), ref: 00741B9A
                            • SendMessageW.USER32(?,00001053), ref: 0077CB2A
                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0077CB41
                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0077CB57
                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0077CB62
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                            • String ID: 0
                            • API String ID: 464785882-4108050209
                            • Opcode ID: cc4b8b05e5cf9b86d3778d2e64d2e524d699974e976eb9e8ba279b4e96c71609
                            • Instruction ID: 28b3f3d729c9a81ab275638ec5bfa70ce75e91c71475ff80dcd33e544f0d8cde
                            • Opcode Fuzzy Hash: cc4b8b05e5cf9b86d3778d2e64d2e524d699974e976eb9e8ba279b4e96c71609
                            • Instruction Fuzzy Hash: 98128E30604201EFDB16CF24C888BA9B7E5BF48350F54856DF559DB262CB39E852CFA1
                            APIs
                            • DestroyWindow.USER32(00000000), ref: 007B77F1
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 007B78B0
                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 007B78EE
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 007B7900
                            • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 007B7946
                            • GetClientRect.USER32(00000000,?), ref: 007B7952
                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 007B7996
                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 007B79A5
                            • GetStockObject.GDI32(00000011), ref: 007B79B5
                            • SelectObject.GDI32(00000000,00000000), ref: 007B79B9
                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 007B79C9
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007B79D2
                            • DeleteDC.GDI32(00000000), ref: 007B79DB
                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007B7A07
                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 007B7A1E
                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 007B7A59
                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 007B7A6D
                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 007B7A7E
                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 007B7AAE
                            • GetStockObject.GDI32(00000011), ref: 007B7AB9
                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 007B7AC4
                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 007B7ACE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                            • API String ID: 2910397461-517079104
                            • Opcode ID: 619147896f449240cd799d2b0a07025d1684e953904abd38309a4a6ed42bd7ac
                            • Instruction ID: 3c7e82e053e2f1ab01454fc6d447820f597e44ac2dd7dbef72464af6601ad273
                            • Opcode Fuzzy Hash: 619147896f449240cd799d2b0a07025d1684e953904abd38309a4a6ed42bd7ac
                            • Instruction Fuzzy Hash: F2A152B1A40219BFEB14DB64DC4AFAF7BB9EB45710F108118FA15A72E0D778AD10CB64
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 007AAF89
                            • GetDriveTypeW.KERNEL32(?,007CFAC0,?,\\.\,007CF910), ref: 007AB066
                            • SetErrorMode.KERNEL32(00000000,007CFAC0,?,\\.\,007CF910), ref: 007AB1C4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorMode$DriveType
                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                            • API String ID: 2907320926-4222207086
                            • Opcode ID: 1f9c375eeb437d7b21bc2120a4e8eb564869be6b1496b3d2fa264f8378cbac9a
                            • Instruction ID: 788b5c029b8a72ca03584d728779b1b6131ee5d40c1be3863f1d3cc6e31166d2
                            • Opcode Fuzzy Hash: 1f9c375eeb437d7b21bc2120a4e8eb564869be6b1496b3d2fa264f8378cbac9a
                            • Instruction Fuzzy Hash: D55193B068430DFB8B04EB20C996D7E77B2EBD63417208215F50AA7392D77DAD41DB62
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __wcsnicmp
                            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                            • API String ID: 1038674560-86951937
                            • Opcode ID: a0712dd4e945a9a56ab1fc6dcb251226c11fe1694798deff14bb88a51cf7ba7b
                            • Instruction ID: a6d3720d941d6454b910e63e1563ccc5b90b5e3bd3985188f295e5ffd69f8109
                            • Opcode Fuzzy Hash: a0712dd4e945a9a56ab1fc6dcb251226c11fe1694798deff14bb88a51cf7ba7b
                            • Instruction Fuzzy Hash: E681FAB0740245FACF24AF70CC86FAE7768EF16740F14C165FD46AA182EB6CDA45D292
                            APIs
                            • GetSysColor.USER32(00000012), ref: 007CAB99
                            • SetTextColor.GDI32(?,?), ref: 007CAB9D
                            • GetSysColorBrush.USER32(0000000F), ref: 007CABB3
                            • GetSysColor.USER32(0000000F), ref: 007CABBE
                            • CreateSolidBrush.GDI32(?), ref: 007CABC3
                            • GetSysColor.USER32(00000011), ref: 007CABDB
                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 007CABE9
                            • SelectObject.GDI32(?,00000000), ref: 007CABFA
                            • SetBkColor.GDI32(?,00000000), ref: 007CAC03
                            • SelectObject.GDI32(?,?), ref: 007CAC10
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 007CAC2F
                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007CAC46
                            • GetWindowLongW.USER32(00000000,000000F0), ref: 007CAC5B
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007CACA7
                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 007CACCE
                            • InflateRect.USER32(?,000000FD,000000FD), ref: 007CACEC
                            • DrawFocusRect.USER32(?,?), ref: 007CACF7
                            • GetSysColor.USER32(00000011), ref: 007CAD05
                            • SetTextColor.GDI32(?,00000000), ref: 007CAD0D
                            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 007CAD21
                            • SelectObject.GDI32(?,007CA869), ref: 007CAD38
                            • DeleteObject.GDI32(?), ref: 007CAD43
                            • SelectObject.GDI32(?,?), ref: 007CAD49
                            • DeleteObject.GDI32(?), ref: 007CAD4E
                            • SetTextColor.GDI32(?,?), ref: 007CAD54
                            • SetBkColor.GDI32(?,?), ref: 007CAD5E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                            • String ID:
                            • API String ID: 1996641542-0
                            • Opcode ID: 2c8a740d1df42685f98c2924116fcb815beeaf7b8b4ca1c45e09a0f130085573
                            • Instruction ID: 91689055e9667e86bc12c19cfe4fd5247d7bc6201ba908cf6cec8f090c718a26
                            • Opcode Fuzzy Hash: 2c8a740d1df42685f98c2924116fcb815beeaf7b8b4ca1c45e09a0f130085573
                            • Instruction Fuzzy Hash: F1614C71900218FFDF119FA8DC48EAE7B7AFB08325F148129F915AB2A1D7799D40DB90
                            APIs
                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 007C8D34
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007C8D45
                            • CharNextW.USER32(0000014E), ref: 007C8D74
                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 007C8DB5
                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 007C8DCB
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007C8DDC
                            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 007C8DF9
                            • SetWindowTextW.USER32(?,0000014E), ref: 007C8E45
                            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 007C8E5B
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 007C8E8C
                            • _memset.LIBCMT ref: 007C8EB1
                            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 007C8EFA
                            • _memset.LIBCMT ref: 007C8F59
                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 007C8F83
                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 007C8FDB
                            • SendMessageW.USER32(?,0000133D,?,?), ref: 007C9088
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 007C90AA
                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007C90F4
                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007C9121
                            • DrawMenuBar.USER32(?), ref: 007C9130
                            • SetWindowTextW.USER32(?,0000014E), ref: 007C9158
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                            • String ID: 0
                            • API String ID: 1073566785-4108050209
                            • Opcode ID: a26bf55da0864543ec74e7c9a3aca39f2a72ea79b384de4c125acfbdb573cc64
                            • Instruction ID: e9993ad1e5dae3a8d3fb2ab7da0dbb014ddbfc2cb2a05c27a59d3a93c4e08ff7
                            • Opcode Fuzzy Hash: a26bf55da0864543ec74e7c9a3aca39f2a72ea79b384de4c125acfbdb573cc64
                            • Instruction Fuzzy Hash: 15E17170900219EBDF609F54CC89FEE7BB9EF05710F14815DFA16AA290DB788A81DF61
                            APIs
                            • GetCursorPos.USER32(?), ref: 007C4C51
                            • GetDesktopWindow.USER32 ref: 007C4C66
                            • GetWindowRect.USER32(00000000), ref: 007C4C6D
                            • GetWindowLongW.USER32(?,000000F0), ref: 007C4CCF
                            • DestroyWindow.USER32(?), ref: 007C4CFB
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 007C4D24
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007C4D42
                            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 007C4D68
                            • SendMessageW.USER32(?,00000421,?,?), ref: 007C4D7D
                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 007C4D90
                            • IsWindowVisible.USER32(?), ref: 007C4DB0
                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 007C4DCB
                            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 007C4DDF
                            • GetWindowRect.USER32(?,?), ref: 007C4DF7
                            • MonitorFromPoint.USER32(?,?,00000002), ref: 007C4E1D
                            • GetMonitorInfoW.USER32(00000000,?), ref: 007C4E37
                            • CopyRect.USER32(?,?), ref: 007C4E4E
                            • SendMessageW.USER32(?,00000412,00000000), ref: 007C4EB9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                            • String ID: ($0$tooltips_class32
                            • API String ID: 698492251-4156429822
                            • Opcode ID: 80d5c76f2dc5114a0074a7133507d91e1bb3455975c2540be50871ef01c66178
                            • Instruction ID: d993678917c895e525473c84c65e9370b1d09a67b9670c0c95426c1396bf5f54
                            • Opcode Fuzzy Hash: 80d5c76f2dc5114a0074a7133507d91e1bb3455975c2540be50871ef01c66178
                            • Instruction Fuzzy Hash: AAB16A71604340AFDB14DF64C858F6ABBE5BF88310F00891CF599AB2A1D779EC04CBA5
                            APIs
                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 007A46E8
                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 007A470E
                            • _wcscpy.LIBCMT ref: 007A473C
                            • _wcscmp.LIBCMT ref: 007A4747
                            • _wcscat.LIBCMT ref: 007A475D
                            • _wcsstr.LIBCMT ref: 007A4768
                            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 007A4784
                            • _wcscat.LIBCMT ref: 007A47CD
                            • _wcscat.LIBCMT ref: 007A47D4
                            • _wcsncpy.LIBCMT ref: 007A47FF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                            • API String ID: 699586101-1459072770
                            • Opcode ID: 3a59fd190117b30f3428a8b939e820c01aed79e72e9a9b65cd1c31b581fbe593
                            • Instruction ID: f10b3fe123aedf40afd045ffbb94e82d6157eff2ca0cc76b916aaaeacc0e6b1f
                            • Opcode Fuzzy Hash: 3a59fd190117b30f3428a8b939e820c01aed79e72e9a9b65cd1c31b581fbe593
                            • Instruction Fuzzy Hash: 17412C72600204FADB10AB749C4BEBF777CEF82710F04416AFD06E6182EB7D990197A5
                            APIs
                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007428BC
                            • GetSystemMetrics.USER32(00000007), ref: 007428C4
                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007428EF
                            • GetSystemMetrics.USER32(00000008), ref: 007428F7
                            • GetSystemMetrics.USER32(00000004), ref: 0074291C
                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00742939
                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00742949
                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0074297C
                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00742990
                            • GetClientRect.USER32(00000000,000000FF), ref: 007429AE
                            • GetStockObject.GDI32(00000011), ref: 007429CA
                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 007429D5
                              • Part of subcall function 00742344: GetCursorPos.USER32(?), ref: 00742357
                              • Part of subcall function 00742344: ScreenToClient.USER32(008067B0,?), ref: 00742374
                              • Part of subcall function 00742344: GetAsyncKeyState.USER32(00000001), ref: 00742399
                              • Part of subcall function 00742344: GetAsyncKeyState.USER32(00000002), ref: 007423A7
                            • SetTimer.USER32(00000000,00000000,00000028,00741256), ref: 007429FC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                            • String ID: AutoIt v3 GUI
                            • API String ID: 1458621304-248962490
                            • Opcode ID: f94bc4f9fd1b7ec752549cd957793e033b5225da0695902150c1cfaa23068a2b
                            • Instruction ID: a93ffb20cfc97e6c622b4e1f927b358e87bf48de2ef6c2ec75661251168cad06
                            • Opcode Fuzzy Hash: f94bc4f9fd1b7ec752549cd957793e033b5225da0695902150c1cfaa23068a2b
                            • Instruction Fuzzy Hash: CCB15E7160020ADFDF15DFA8DC45FAE7BB5FB08314F108229FA15E6290DB789861CB55
                            APIs
                            • CharUpperBuffW.USER32(?,?), ref: 007C40F6
                            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 007C41B6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: BuffCharMessageSendUpper
                            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                            • API String ID: 3974292440-719923060
                            • Opcode ID: 838b2e7aebfec2dc7f543769839635388885e5bda5d01498b2db8782b59c13a4
                            • Instruction ID: 61b777f3516f51655ca8b0d8d864e210a6c39244e0b539732e330c8c450239b7
                            • Opcode Fuzzy Hash: 838b2e7aebfec2dc7f543769839635388885e5bda5d01498b2db8782b59c13a4
                            • Instruction Fuzzy Hash: BEA17D70214245DBCB14EF20C966F6AB3A5BF85314F14896CB996AB392DB3CEC05CB91
                            APIs
                            • LoadCursorW.USER32(00000000,00007F89), ref: 007B5309
                            • LoadCursorW.USER32(00000000,00007F8A), ref: 007B5314
                            • LoadCursorW.USER32(00000000,00007F00), ref: 007B531F
                            • LoadCursorW.USER32(00000000,00007F03), ref: 007B532A
                            • LoadCursorW.USER32(00000000,00007F8B), ref: 007B5335
                            • LoadCursorW.USER32(00000000,00007F01), ref: 007B5340
                            • LoadCursorW.USER32(00000000,00007F81), ref: 007B534B
                            • LoadCursorW.USER32(00000000,00007F88), ref: 007B5356
                            • LoadCursorW.USER32(00000000,00007F80), ref: 007B5361
                            • LoadCursorW.USER32(00000000,00007F86), ref: 007B536C
                            • LoadCursorW.USER32(00000000,00007F83), ref: 007B5377
                            • LoadCursorW.USER32(00000000,00007F85), ref: 007B5382
                            • LoadCursorW.USER32(00000000,00007F82), ref: 007B538D
                            • LoadCursorW.USER32(00000000,00007F84), ref: 007B5398
                            • LoadCursorW.USER32(00000000,00007F04), ref: 007B53A3
                            • LoadCursorW.USER32(00000000,00007F02), ref: 007B53AE
                            • GetCursorInfo.USER32(?), ref: 007B53BE
                            • GetLastError.KERNEL32(00000001,00000000), ref: 007B53E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Cursor$Load$ErrorInfoLast
                            • String ID:
                            • API String ID: 3215588206-0
                            • Opcode ID: 3bd6baab93411cbceeedddd479facaf50876d091d3ed24ec567568d6ea5d8afa
                            • Instruction ID: 73d75bc388e8622abf23c28b849020fdc0e9c918751e147ae64a309c794fe736
                            • Opcode Fuzzy Hash: 3bd6baab93411cbceeedddd479facaf50876d091d3ed24ec567568d6ea5d8afa
                            • Instruction Fuzzy Hash: AB416470E04319AADB109FBA8C49DAFFFF8EF51B50B10452FE509E7290DAB89501CE51
                            APIs
                            • GetClassNameW.USER32(?,?,00000100), ref: 0079AAA5
                            • __swprintf.LIBCMT ref: 0079AB46
                            • _wcscmp.LIBCMT ref: 0079AB59
                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0079ABAE
                            • _wcscmp.LIBCMT ref: 0079ABEA
                            • GetClassNameW.USER32(?,?,00000400), ref: 0079AC21
                            • GetDlgCtrlID.USER32(?), ref: 0079AC73
                            • GetWindowRect.USER32(?,?), ref: 0079ACA9
                            • GetParent.USER32(?), ref: 0079ACC7
                            • ScreenToClient.USER32(00000000), ref: 0079ACCE
                            • GetClassNameW.USER32(?,?,00000100), ref: 0079AD48
                            • _wcscmp.LIBCMT ref: 0079AD5C
                            • GetWindowTextW.USER32(?,?,00000400), ref: 0079AD82
                            • _wcscmp.LIBCMT ref: 0079AD96
                              • Part of subcall function 0076386C: _iswctype.LIBCMT ref: 00763874
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                            • String ID: %s%u
                            • API String ID: 3744389584-679674701
                            • Opcode ID: 320ea1b688101f89fb3f2eca8631b0e19d2b6340b3c19923d49a5e4ab0b12bba
                            • Instruction ID: a0f27596f4c1d36b532059266c13e320444a8290097d3db8e1ee0fd3ac328848
                            • Opcode Fuzzy Hash: 320ea1b688101f89fb3f2eca8631b0e19d2b6340b3c19923d49a5e4ab0b12bba
                            • Instruction Fuzzy Hash: 1FA1CD71205606FBDB14DF20D888FAAB7A8FF04315F108629F999D2590DB38E945CBE2
                            APIs
                            • GetClassNameW.USER32(00000008,?,00000400), ref: 0079B3DB
                            • _wcscmp.LIBCMT ref: 0079B3EC
                            • GetWindowTextW.USER32(00000001,?,00000400), ref: 0079B414
                            • CharUpperBuffW.USER32(?,00000000), ref: 0079B431
                            • _wcscmp.LIBCMT ref: 0079B44F
                            • _wcsstr.LIBCMT ref: 0079B460
                            • GetClassNameW.USER32(00000018,?,00000400), ref: 0079B498
                            • _wcscmp.LIBCMT ref: 0079B4A8
                            • GetWindowTextW.USER32(00000002,?,00000400), ref: 0079B4CF
                            • GetClassNameW.USER32(00000018,?,00000400), ref: 0079B518
                            • _wcscmp.LIBCMT ref: 0079B528
                            • GetClassNameW.USER32(00000010,?,00000400), ref: 0079B550
                            • GetWindowRect.USER32(00000004,?), ref: 0079B5B9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                            • String ID: @$ThumbnailClass
                            • API String ID: 1788623398-1539354611
                            • Opcode ID: 69a483b88a16039578f2af807fab20f9f76743a13e60b8f44304d6ca7bf611ec
                            • Instruction ID: 686a0ac636d709b17d96384d5b5dde76c9c648565408fb2d6f70d318d29365bd
                            • Opcode Fuzzy Hash: 69a483b88a16039578f2af807fab20f9f76743a13e60b8f44304d6ca7bf611ec
                            • Instruction Fuzzy Hash: 50818F710083459BDF04DF10EA85FAA7BE8EF44714F04856DFD859A0A2DB38ED49CB61
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __wcsnicmp
                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                            • API String ID: 1038674560-1810252412
                            • Opcode ID: 51dea079ef1eb7eef47b273e32297ce46d64fa3cf3a2ac2e5a7f86758ab125a8
                            • Instruction ID: 5a40fda26a8863b09595ce7ae16c89703ac14fe8e8bb1c41e8ead0388cf2bfd8
                            • Opcode Fuzzy Hash: 51dea079ef1eb7eef47b273e32297ce46d64fa3cf3a2ac2e5a7f86758ab125a8
                            • Instruction Fuzzy Hash: 2F315E71A44209E6DF18FB60EE47EBE7764EF10750F600129F641B11D2EF6D6E04C951
                            APIs
                            • LoadIconW.USER32(00000063), ref: 0079C4D4
                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0079C4E6
                            • SetWindowTextW.USER32(?,?), ref: 0079C4FD
                            • GetDlgItem.USER32(?,000003EA), ref: 0079C512
                            • SetWindowTextW.USER32(00000000,?), ref: 0079C518
                            • GetDlgItem.USER32(?,000003E9), ref: 0079C528
                            • SetWindowTextW.USER32(00000000,?), ref: 0079C52E
                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0079C54F
                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0079C569
                            • GetWindowRect.USER32(?,?), ref: 0079C572
                            • SetWindowTextW.USER32(?,?), ref: 0079C5DD
                            • GetDesktopWindow.USER32 ref: 0079C5E3
                            • GetWindowRect.USER32(00000000), ref: 0079C5EA
                            • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0079C636
                            • GetClientRect.USER32(?,?), ref: 0079C643
                            • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0079C668
                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0079C693
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                            • String ID:
                            • API String ID: 3869813825-0
                            • Opcode ID: 15098a8b72aabe614fb530b8928e515f05e32f2bca90002591bcb74a7f3daa01
                            • Instruction ID: d333748493a8348589abd6db8c0af52846d3e6e1b42cdffecd7589d6caa4b92b
                            • Opcode Fuzzy Hash: 15098a8b72aabe614fb530b8928e515f05e32f2bca90002591bcb74a7f3daa01
                            • Instruction Fuzzy Hash: 62514A70A00709AFDF219FA8DD89F6EBBB5FB04705F10492CE686A25A0C778A914CB54
                            APIs
                            • _memset.LIBCMT ref: 007CA4C8
                            • DestroyWindow.USER32(?,?), ref: 007CA542
                              • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 007CA5BC
                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 007CA5DE
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007CA5F1
                            • DestroyWindow.USER32(00000000), ref: 007CA613
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00740000,00000000), ref: 007CA64A
                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007CA663
                            • GetDesktopWindow.USER32 ref: 007CA67C
                            • GetWindowRect.USER32(00000000), ref: 007CA683
                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 007CA69B
                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 007CA6B3
                              • Part of subcall function 007425DB: GetWindowLongW.USER32(?,000000EB), ref: 007425EC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                            • String ID: 0$tooltips_class32
                            • API String ID: 1297703922-3619404913
                            • Opcode ID: fba57f513c91e5ad8897af9f38c56cc155bb061e36753374657b1950504babc6
                            • Instruction ID: d70a31184aa125afcea42fed1d65840b672301d92c326ea93feccea1415e22e0
                            • Opcode Fuzzy Hash: fba57f513c91e5ad8897af9f38c56cc155bb061e36753374657b1950504babc6
                            • Instruction Fuzzy Hash: 6171AC71140309AFD720CF28DC49F6A7BE6FB88309F08852DF985972A0D779E916DB16
                            APIs
                              • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                            • DragQueryPoint.SHELL32(?,?), ref: 007CC917
                              • Part of subcall function 007CADF1: ClientToScreen.USER32(?,?), ref: 007CAE1A
                              • Part of subcall function 007CADF1: GetWindowRect.USER32(?,?), ref: 007CAE90
                              • Part of subcall function 007CADF1: PtInRect.USER32(?,?,007CC304), ref: 007CAEA0
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 007CC980
                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 007CC98B
                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 007CC9AE
                            • _wcscat.LIBCMT ref: 007CC9DE
                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 007CC9F5
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 007CCA0E
                            • SendMessageW.USER32(?,000000B1,?,?), ref: 007CCA25
                            • SendMessageW.USER32(?,000000B1,?,?), ref: 007CCA47
                            • DragFinish.SHELL32(?), ref: 007CCA4E
                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 007CCB41
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                            • API String ID: 169749273-3440237614
                            • Opcode ID: e0f908fed817b98e33703faa583475ec760d2229b6879dac15947fa8a8a87489
                            • Instruction ID: c20aa165e2335d2cc2c9985b91453ec382dfe5385a3970240739f774ae1b15a7
                            • Opcode Fuzzy Hash: e0f908fed817b98e33703faa583475ec760d2229b6879dac15947fa8a8a87489
                            • Instruction Fuzzy Hash: 6F615C71108305AFC701DF64CC89EAFBBE9FF88750F004A2DF695962A1DB749A49CB52
                            APIs
                            • CharUpperBuffW.USER32(?,?), ref: 007C46AB
                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007C46F6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: BuffCharMessageSendUpper
                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                            • API String ID: 3974292440-4258414348
                            • Opcode ID: d154fca3900683635895467124eca32378834e353c87f5de4b9319c5d800198d
                            • Instruction ID: dcfacddd933740f74c12798d8edd21e426c6d5ef5e95800f0bef4863e7d7de4f
                            • Opcode Fuzzy Hash: d154fca3900683635895467124eca32378834e353c87f5de4b9319c5d800198d
                            • Instruction Fuzzy Hash: 64915A34204705DFCB14EF20C465A6AB7A5AF95314F04896CF9966B3A2CB38ED4ACB81
                            APIs
                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 007CBB6E
                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,007C9431), ref: 007CBBCA
                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007CBC03
                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 007CBC46
                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007CBC7D
                            • FreeLibrary.KERNEL32(?), ref: 007CBC89
                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 007CBC99
                            • DestroyIcon.USER32(?,?,?,?,?,007C9431), ref: 007CBCA8
                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 007CBCC5
                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 007CBCD1
                              • Part of subcall function 0076313D: __wcsicmp_l.LIBCMT ref: 007631C6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                            • String ID: .dll$.exe$.icl
                            • API String ID: 1212759294-1154884017
                            • Opcode ID: 664bf000aad649a5b19d0337a2b2ca517abaa9b29967fc62b331af19fdea931b
                            • Instruction ID: 20c3cd5758455b754003de0303091a0e2871c3f1284e25ae68ecb2e3b2d66946
                            • Opcode Fuzzy Hash: 664bf000aad649a5b19d0337a2b2ca517abaa9b29967fc62b331af19fdea931b
                            • Instruction Fuzzy Hash: E661B1B1A00619FAEB24DF64CC86FBE77A8EB08710F10811DF915D61D1DB79AD50DB60
                            APIs
                            • LoadStringW.USER32(00000066,?,00000FFF,007CFB78), ref: 007AA0FC
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                            • LoadStringW.USER32(?,?,00000FFF,?), ref: 007AA11E
                            • __swprintf.LIBCMT ref: 007AA177
                            • __swprintf.LIBCMT ref: 007AA190
                            • _wprintf.LIBCMT ref: 007AA246
                            • _wprintf.LIBCMT ref: 007AA264
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: LoadString__swprintf_wprintf$_memmove
                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR$%}
                            • API String ID: 311963372-1266152252
                            • Opcode ID: 3c68802324ca4e802bd299f6c46956ba739a56f6f5e101e41ff007128f42fed3
                            • Instruction ID: b8e0065db80f44e4ced5db2dfc6a206bb3709a67104138fb0442b6e0989fab10
                            • Opcode Fuzzy Hash: 3c68802324ca4e802bd299f6c46956ba739a56f6f5e101e41ff007128f42fed3
                            • Instruction Fuzzy Hash: EA518E71900119FBCF15EBA0CD8AEEEB779AF44300F104265F505721A2EB396F69CB61
                            APIs
                              • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                              • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                            • CharLowerBuffW.USER32(?,?), ref: 007AA636
                            • GetDriveTypeW.KERNEL32 ref: 007AA683
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007AA6CB
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007AA702
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007AA730
                              • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                            • API String ID: 2698844021-4113822522
                            • Opcode ID: 29dcf27acc00138dfdbba9a2caa4f7d115c17e22b2fdd3eceb9fac35e1576151
                            • Instruction ID: 5ac70c8b711f41ef24f18bef3dfc8435f511c0080af3b0020414c2fec469b856
                            • Opcode Fuzzy Hash: 29dcf27acc00138dfdbba9a2caa4f7d115c17e22b2fdd3eceb9fac35e1576151
                            • Instruction Fuzzy Hash: B9513CB1104305EFC704EF20C88586AB7F4FF94718F04896DF89A97261DB39AE0ACB52
                            APIs
                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 007AA47A
                            • __swprintf.LIBCMT ref: 007AA49C
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 007AA4D9
                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 007AA4FE
                            • _memset.LIBCMT ref: 007AA51D
                            • _wcsncpy.LIBCMT ref: 007AA559
                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 007AA58E
                            • CloseHandle.KERNEL32(00000000), ref: 007AA599
                            • RemoveDirectoryW.KERNEL32(?), ref: 007AA5A2
                            • CloseHandle.KERNEL32(00000000), ref: 007AA5AC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                            • String ID: :$\$\??\%s
                            • API String ID: 2733774712-3457252023
                            • Opcode ID: 92169a41b276066306ad20ff20aad3d4cdbc84f89670308606e95bdd177fb03a
                            • Instruction ID: 6e6f0090090870e633fea5456daa4d964f66a9edacec994e96ed33a493b22964
                            • Opcode Fuzzy Hash: 92169a41b276066306ad20ff20aad3d4cdbc84f89670308606e95bdd177fb03a
                            • Instruction Fuzzy Hash: 9031B0B1900249BBDB219FA0DC48FEB37BDEF89701F1041BAF909D2160E7789654CB29
                            APIs
                            • __wsplitpath.LIBCMT ref: 007ADC7B
                            • _wcscat.LIBCMT ref: 007ADC93
                            • _wcscat.LIBCMT ref: 007ADCA5
                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007ADCBA
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 007ADCCE
                            • GetFileAttributesW.KERNEL32(?), ref: 007ADCE6
                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 007ADD00
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 007ADD12
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                            • String ID: *.*
                            • API String ID: 34673085-438819550
                            • Opcode ID: 743e726e0321e7b4cec0530b09dd2906fe2e54cae10c2a961bc9abc61ee422e4
                            • Instruction ID: 06200f8c9e1c582960d35cf9edb75a4483974be3604078bfea551b8d5dc37e52
                            • Opcode Fuzzy Hash: 743e726e0321e7b4cec0530b09dd2906fe2e54cae10c2a961bc9abc61ee422e4
                            • Instruction Fuzzy Hash: D18195B2604241DFCB34DF24C4459AAB7E9BBCA310F15892EF886C7651E738DD45CB62
                            APIs
                              • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 007CC4EC
                            • GetFocus.USER32 ref: 007CC4FC
                            • GetDlgCtrlID.USER32(00000000), ref: 007CC507
                            • _memset.LIBCMT ref: 007CC632
                            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 007CC65D
                            • GetMenuItemCount.USER32(?), ref: 007CC67D
                            • GetMenuItemID.USER32(?,00000000), ref: 007CC690
                            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 007CC6C4
                            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 007CC70C
                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007CC744
                            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 007CC779
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                            • String ID: 0
                            • API String ID: 1296962147-4108050209
                            • Opcode ID: a0c31e9e9c836f304a4c47a0906be801ae8826d98ef844f2d87f338957a5d67d
                            • Instruction ID: a32bcbf5bf5f48fa4d13c2b4b08156be44fd66e2b976ae3dec642cfc8f3d8db4
                            • Opcode Fuzzy Hash: a0c31e9e9c836f304a4c47a0906be801ae8826d98ef844f2d87f338957a5d67d
                            • Instruction Fuzzy Hash: ED816A702083019FDB12CF24D985F6BBBE9FB88314F14452DF999A7291D738D915CBA2
                            APIs
                              • Part of subcall function 0079874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00798766
                              • Part of subcall function 0079874A: GetLastError.KERNEL32(?,0079822A,?,?,?), ref: 00798770
                              • Part of subcall function 0079874A: GetProcessHeap.KERNEL32(00000008,?,?,0079822A,?,?,?), ref: 0079877F
                              • Part of subcall function 0079874A: HeapAlloc.KERNEL32(00000000,?,0079822A,?,?,?), ref: 00798786
                              • Part of subcall function 0079874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0079879D
                              • Part of subcall function 007987E7: GetProcessHeap.KERNEL32(00000008,00798240,00000000,00000000,?,00798240,?), ref: 007987F3
                              • Part of subcall function 007987E7: HeapAlloc.KERNEL32(00000000,?,00798240,?), ref: 007987FA
                              • Part of subcall function 007987E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00798240,?), ref: 0079880B
                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00798458
                            • _memset.LIBCMT ref: 0079846D
                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0079848C
                            • GetLengthSid.ADVAPI32(?), ref: 0079849D
                            • GetAce.ADVAPI32(?,00000000,?), ref: 007984DA
                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007984F6
                            • GetLengthSid.ADVAPI32(?), ref: 00798513
                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00798522
                            • HeapAlloc.KERNEL32(00000000), ref: 00798529
                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0079854A
                            • CopySid.ADVAPI32(00000000), ref: 00798551
                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00798582
                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007985A8
                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007985BC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                            • String ID:
                            • API String ID: 3996160137-0
                            • Opcode ID: a9f36d6475c36cc15003cb3d460f27aff23674161285ae0675cb9b331e3e61ad
                            • Instruction ID: 4def944dc2fe2ba9387b1f195cdccf7d39fd91c21e7934bcc4fcaa5f6495b3db
                            • Opcode Fuzzy Hash: a9f36d6475c36cc15003cb3d460f27aff23674161285ae0675cb9b331e3e61ad
                            • Instruction Fuzzy Hash: 7861387190020AEFDF00DFA4EC45EAEBBB9FF05700F14816AE815A7291DB399A15CF61
                            APIs
                            • GetDC.USER32(00000000), ref: 007B76A2
                            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 007B76AE
                            • CreateCompatibleDC.GDI32(?), ref: 007B76BA
                            • SelectObject.GDI32(00000000,?), ref: 007B76C7
                            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 007B771B
                            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 007B7757
                            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 007B777B
                            • SelectObject.GDI32(00000006,?), ref: 007B7783
                            • DeleteObject.GDI32(?), ref: 007B778C
                            • DeleteDC.GDI32(00000006), ref: 007B7793
                            • ReleaseDC.USER32(00000000,?), ref: 007B779E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                            • String ID: (
                            • API String ID: 2598888154-3887548279
                            • Opcode ID: 2a14cd1ac70d42b58f59fccebf276302de72703a22966171d24e56e9738529ff
                            • Instruction ID: b73521040524e9340f116d669535e02ca5bf0def4f8a4e135ba236c54f804d64
                            • Opcode Fuzzy Hash: 2a14cd1ac70d42b58f59fccebf276302de72703a22966171d24e56e9738529ff
                            • Instruction Fuzzy Hash: C5513875904209EFCB15CFA8CC89EAEBBB9EF48710F14852DF94AA7210D735A940CB64
                            APIs
                              • Part of subcall function 00760B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00746C6C,?,00008000), ref: 00760BB7
                              • Part of subcall function 007448AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007448A1,?,?,007437C0,?), ref: 007448CE
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00746D0D
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00746E5A
                              • Part of subcall function 007459CD: _wcscpy.LIBCMT ref: 00745A05
                              • Part of subcall function 0076387D: _iswctype.LIBCMT ref: 00763885
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                            • API String ID: 537147316-1018226102
                            • Opcode ID: 0835904d2ab676059a43be0c0ae54ab2ab36ef21c2d12b9a210250d8f57171fd
                            • Instruction ID: e2a4ce778468778995d42e2ff8084cb1d6e091eed5549bce12de51cfc45a93ec
                            • Opcode Fuzzy Hash: 0835904d2ab676059a43be0c0ae54ab2ab36ef21c2d12b9a210250d8f57171fd
                            • Instruction Fuzzy Hash: 1F026B71108341DFCB14EF24C885AAFBBE5BF99354F04891DF48A972A2DB38D949CB52
                            APIs
                            • _memset.LIBCMT ref: 007445F9
                            • GetMenuItemCount.USER32(00806890), ref: 0077D7CD
                            • GetMenuItemCount.USER32(00806890), ref: 0077D87D
                            • GetCursorPos.USER32(?), ref: 0077D8C1
                            • SetForegroundWindow.USER32(00000000), ref: 0077D8CA
                            • TrackPopupMenuEx.USER32(00806890,00000000,?,00000000,00000000,00000000), ref: 0077D8DD
                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0077D8E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                            • String ID:
                            • API String ID: 2751501086-0
                            • Opcode ID: 56c3f3e8dffed63be3364b1631bcd38bb8ab453813e58c1981673da948b1bab9
                            • Instruction ID: 39d76d04f52104ed9780f6c68601bcc58b6481a0bc0e9f436f4cd8c142e8a148
                            • Opcode Fuzzy Hash: 56c3f3e8dffed63be3364b1631bcd38bb8ab453813e58c1981673da948b1bab9
                            • Instruction Fuzzy Hash: 6771E270601205BAEF349F24DC49FAABF65FF053A4F208216F529A61E1C7B96C20DB95
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 007B8BEC
                            • CoInitialize.OLE32(00000000), ref: 007B8C19
                            • CoUninitialize.OLE32 ref: 007B8C23
                            • GetRunningObjectTable.OLE32(00000000,?), ref: 007B8D23
                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 007B8E50
                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,007D2C0C), ref: 007B8E84
                            • CoGetObject.OLE32(?,00000000,007D2C0C,?), ref: 007B8EA7
                            • SetErrorMode.KERNEL32(00000000), ref: 007B8EBA
                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 007B8F3A
                            • VariantClear.OLEAUT32(?), ref: 007B8F4A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                            • String ID: ,,}
                            • API String ID: 2395222682-3650289849
                            • Opcode ID: d5ea4d59ba7b930dd7e9d646f30aad871201e4b127b42bde9a1b2d91495a1acb
                            • Instruction ID: cb4a386233183fe21407eb8a92c0d600f052d5731f485263f8930e3e04c5fa28
                            • Opcode Fuzzy Hash: d5ea4d59ba7b930dd7e9d646f30aad871201e4b127b42bde9a1b2d91495a1acb
                            • Instruction Fuzzy Hash: 62C124B1208305AFC740EF24C884A6BB7E9FF89748F00496DF5899B251DB35ED05CB62
                            APIs
                            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C0038,?,?), ref: 007C10BC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: BuffCharUpper
                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                            • API String ID: 3964851224-909552448
                            • Opcode ID: 36f79a783f7890f932ccad53b1806d895a3077dbd629de4b094dd982204fe152
                            • Instruction ID: fe08504025f8d1630865b367e8071b61ea5cac4a0a8e8a928df596cef7bd6491
                            • Opcode Fuzzy Hash: 36f79a783f7890f932ccad53b1806d895a3077dbd629de4b094dd982204fe152
                            • Instruction Fuzzy Hash: 26412D3025024EDBCF10EFA0DC95AEA3724BF12340F94456CEE925B252DB3CAD1AC790
                            APIs
                              • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                              • Part of subcall function 00747A84: _memmove.LIBCMT ref: 00747B0D
                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007A55D2
                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007A55E8
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007A55F9
                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 007A560B
                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 007A561C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: SendString$_memmove
                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                            • API String ID: 2279737902-1007645807
                            • Opcode ID: c388d561f18845eefa9ba5886733b62f294d3be39d150a353a8dfd5152337e8b
                            • Instruction ID: fef867284bc82256ac7d96a3cb2a6608b49a7f685f92d441d67dad76f9306fc8
                            • Opcode Fuzzy Hash: c388d561f18845eefa9ba5886733b62f294d3be39d150a353a8dfd5152337e8b
                            • Instruction Fuzzy Hash: AE1182A0A6016DB9D724A765CC8ADFF7B7CFFD2F00F400569B505A21D1DF681D05C5A1
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                            • String ID: 0.0.0.0
                            • API String ID: 208665112-3771769585
                            • Opcode ID: 66000d2a5f64901bd6e52b7e9f154d506103a6f457b3b6b99e63bdcdc030079f
                            • Instruction ID: db5c5bfda80acaa7bb2794f9856f36d9c24522f4ac71fb47bf17fc027e364233
                            • Opcode Fuzzy Hash: 66000d2a5f64901bd6e52b7e9f154d506103a6f457b3b6b99e63bdcdc030079f
                            • Instruction Fuzzy Hash: 8711E731904114EFCB24EB24DC0AEDB77BCDF82720F04427AF845A6091EFBDAA928651
                            APIs
                            • timeGetTime.WINMM ref: 007A521C
                              • Part of subcall function 00760719: timeGetTime.WINMM(?,76C1B400,00750FF9), ref: 0076071D
                            • Sleep.KERNEL32(0000000A), ref: 007A5248
                            • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 007A526C
                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 007A528E
                            • SetActiveWindow.USER32 ref: 007A52AD
                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007A52BB
                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 007A52DA
                            • Sleep.KERNEL32(000000FA), ref: 007A52E5
                            • IsWindow.USER32 ref: 007A52F1
                            • EndDialog.USER32(00000000), ref: 007A5302
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                            • String ID: BUTTON
                            • API String ID: 1194449130-3405671355
                            • Opcode ID: d85ee38791bb967ce362751ee95982cde5eeec47954249376dfac519710a735c
                            • Instruction ID: 792e1cd704f1825d005f3ae8163e15099e4bc18efe333df247860f62515d85ed
                            • Opcode Fuzzy Hash: d85ee38791bb967ce362751ee95982cde5eeec47954249376dfac519710a735c
                            • Instruction Fuzzy Hash: A121A1B0204744BFEB405F20EC88F663B6AFBD6346F045528F501921B1DBADAC508B25
                            APIs
                              • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                              • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                            • CoInitialize.OLE32(00000000), ref: 007AD855
                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 007AD8E8
                            • SHGetDesktopFolder.SHELL32(?), ref: 007AD8FC
                            • CoCreateInstance.OLE32(007D2D7C,00000000,00000001,007FA89C,?), ref: 007AD948
                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 007AD9B7
                            • CoTaskMemFree.OLE32(?,?), ref: 007ADA0F
                            • _memset.LIBCMT ref: 007ADA4C
                            • SHBrowseForFolderW.SHELL32(?), ref: 007ADA88
                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 007ADAAB
                            • CoTaskMemFree.OLE32(00000000), ref: 007ADAB2
                            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 007ADAE9
                            • CoUninitialize.OLE32(00000001,00000000), ref: 007ADAEB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                            • String ID:
                            • API String ID: 1246142700-0
                            • Opcode ID: 535e53285cd1a81bfcdedab426116ee29cc9aefa068311d4b77e30bdc84794ae
                            • Instruction ID: ecf4eaec47f047ebd26218b62b29bdf6dce6f2bea5cec10cfb1bc3bc9a30f388
                            • Opcode Fuzzy Hash: 535e53285cd1a81bfcdedab426116ee29cc9aefa068311d4b77e30bdc84794ae
                            • Instruction Fuzzy Hash: BCB1FC75A00109EFDB14DF64C888DAEBBF9EF89314B048569F90AEB251DB34EE45CB50
                            APIs
                            • GetKeyboardState.USER32(?), ref: 007A05A7
                            • SetKeyboardState.USER32(?), ref: 007A0612
                            • GetAsyncKeyState.USER32(000000A0), ref: 007A0632
                            • GetKeyState.USER32(000000A0), ref: 007A0649
                            • GetAsyncKeyState.USER32(000000A1), ref: 007A0678
                            • GetKeyState.USER32(000000A1), ref: 007A0689
                            • GetAsyncKeyState.USER32(00000011), ref: 007A06B5
                            • GetKeyState.USER32(00000011), ref: 007A06C3
                            • GetAsyncKeyState.USER32(00000012), ref: 007A06EC
                            • GetKeyState.USER32(00000012), ref: 007A06FA
                            • GetAsyncKeyState.USER32(0000005B), ref: 007A0723
                            • GetKeyState.USER32(0000005B), ref: 007A0731
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: State$Async$Keyboard
                            • String ID:
                            • API String ID: 541375521-0
                            • Opcode ID: 784e260a1d44e8c9102fc163a9c6b2ac10ca26a155cb9fa299de9479b26d4988
                            • Instruction ID: 2ba3b2796deee0fdeb28e20380077d7f96aab53155500692bca2243a2c6fc6bf
                            • Opcode Fuzzy Hash: 784e260a1d44e8c9102fc163a9c6b2ac10ca26a155cb9fa299de9479b26d4988
                            • Instruction Fuzzy Hash: F651CD20E0478859FB35DBA08854BEAAFB59F83380F484B99D5C1571C2D66CAA4CCF95
                            APIs
                            • GetDlgItem.USER32(?,00000001), ref: 0079C746
                            • GetWindowRect.USER32(00000000,?), ref: 0079C758
                            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0079C7B6
                            • GetDlgItem.USER32(?,00000002), ref: 0079C7C1
                            • GetWindowRect.USER32(00000000,?), ref: 0079C7D3
                            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0079C827
                            • GetDlgItem.USER32(?,000003E9), ref: 0079C835
                            • GetWindowRect.USER32(00000000,?), ref: 0079C846
                            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0079C889
                            • GetDlgItem.USER32(?,000003EA), ref: 0079C897
                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0079C8B4
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0079C8C1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$ItemMoveRect$Invalidate
                            • String ID:
                            • API String ID: 3096461208-0
                            • Opcode ID: 65aec01759399d8081ecf319509e8d8bac573fdfec0a3ff43556a16b039d0409
                            • Instruction ID: 80ff444198236a765d276aa4430a3cfbbeb5680e4baaac8fe05e536f176992c1
                            • Opcode Fuzzy Hash: 65aec01759399d8081ecf319509e8d8bac573fdfec0a3ff43556a16b039d0409
                            • Instruction Fuzzy Hash: 99513E71B00205AFDF18CFA9DD99EAEBBBAEB88310F14812DF516E7290D7749D008B54
                            APIs
                              • Part of subcall function 00741B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00742036,?,00000000,?,?,?,?,007416CB,00000000,?), ref: 00741B9A
                            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 007420D3
                            • KillTimer.USER32(-00000001,?,?,?,?,007416CB,00000000,?,?,00741AE2,?,?), ref: 0074216E
                            • DestroyAcceleratorTable.USER32(00000000), ref: 0077BEF6
                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007416CB,00000000,?,?,00741AE2,?,?), ref: 0077BF27
                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007416CB,00000000,?,?,00741AE2,?,?), ref: 0077BF3E
                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007416CB,00000000,?,?,00741AE2,?,?), ref: 0077BF5A
                            • DeleteObject.GDI32(00000000), ref: 0077BF6C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                            • String ID:
                            • API String ID: 641708696-0
                            • Opcode ID: f3320587614b92a1dbac0fcb85a2c04a8e18a7240ed489c4a4c8dcf791f4bac8
                            • Instruction ID: 7a59ce8a8ed324dfbfe534505e14623b4e9682edcdf411caf25c758799beb303
                            • Opcode Fuzzy Hash: f3320587614b92a1dbac0fcb85a2c04a8e18a7240ed489c4a4c8dcf791f4bac8
                            • Instruction Fuzzy Hash: 4D618630100610DFCB65AF14DD48B2AB7F2FB50716F90C52DE1468AAB2C779A8B2DF90
                            APIs
                              • Part of subcall function 007425DB: GetWindowLongW.USER32(?,000000EB), ref: 007425EC
                            • GetSysColor.USER32(0000000F), ref: 007421D3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ColorLongWindow
                            • String ID:
                            • API String ID: 259745315-0
                            • Opcode ID: f52b7a10208fb3bb814790810cb9634a44c0bf08967761cf7463e6a942b92425
                            • Instruction ID: 2214e6ecd2a91dc7d0fbd7a67e9a197fc02cd4738766cd968a908dfda65a7e45
                            • Opcode Fuzzy Hash: f52b7a10208fb3bb814790810cb9634a44c0bf08967761cf7463e6a942b92425
                            • Instruction Fuzzy Hash: 1341B3311001549FDB215F28EC48BB93B66FB06331F998269FE658A1E2C7798C52DB25
                            APIs
                            • CharLowerBuffW.USER32(?,?,007CF910), ref: 007AAB76
                            • GetDriveTypeW.KERNEL32(00000061,007FA620,00000061), ref: 007AAC40
                            • _wcscpy.LIBCMT ref: 007AAC6A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: BuffCharDriveLowerType_wcscpy
                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                            • API String ID: 2820617543-1000479233
                            • Opcode ID: 063743e3695365ff003e12d56d43db94ae9bdaea7e5cfa519e5dfbd56c3e5087
                            • Instruction ID: 66e8192ed97b2c01f90bca22d9c7344e9f7e955e68e2c75d6b143ec76966a525
                            • Opcode Fuzzy Hash: 063743e3695365ff003e12d56d43db94ae9bdaea7e5cfa519e5dfbd56c3e5087
                            • Instruction Fuzzy Hash: 2651A271208305EBC714EF14C885AAFB7A5EF85310F148A2DF596572A2DB39DD09CB63
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __i64tow__itow__swprintf
                            • String ID: %.15g$0x%p$False$True
                            • API String ID: 421087845-2263619337
                            • Opcode ID: cc4a3e97cb9f742e51c9b9a3019fac9f72e5e6bb4167497bdfea83a30b5c03bb
                            • Instruction ID: 287ffd24f2bf493019eac87aa0e1cae21ea87f0d3d831335982298a2d9ae7390
                            • Opcode Fuzzy Hash: cc4a3e97cb9f742e51c9b9a3019fac9f72e5e6bb4167497bdfea83a30b5c03bb
                            • Instruction Fuzzy Hash: 3641A271604205EEDF249B38D946E7773E8EB45300F24846EEA4ED7291EB79A942CB11
                            APIs
                            • _memset.LIBCMT ref: 007C73D9
                            • CreateMenu.USER32 ref: 007C73F4
                            • SetMenu.USER32(?,00000000), ref: 007C7403
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007C7490
                            • IsMenu.USER32(?), ref: 007C74A6
                            • CreatePopupMenu.USER32 ref: 007C74B0
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007C74DD
                            • DrawMenuBar.USER32 ref: 007C74E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                            • String ID: 0$F
                            • API String ID: 176399719-3044882817
                            • Opcode ID: e7ca4cf748910632df43bdee5529c73daa0e16e82b29da3b81885126c42f29b7
                            • Instruction ID: db49ad92475e6a19ed415bfa48877f3156cac1cf73addf8a2276ef93326f2edb
                            • Opcode Fuzzy Hash: e7ca4cf748910632df43bdee5529c73daa0e16e82b29da3b81885126c42f29b7
                            • Instruction Fuzzy Hash: 3C411775A00245EFDB18DF64E844F9ABBB9FF49310F14402DEA5597350DB39AA20CF54
                            APIs
                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 007C77CD
                            • CreateCompatibleDC.GDI32(00000000), ref: 007C77D4
                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 007C77E7
                            • SelectObject.GDI32(00000000,00000000), ref: 007C77EF
                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 007C77FA
                            • DeleteDC.GDI32(00000000), ref: 007C7803
                            • GetWindowLongW.USER32(?,000000EC), ref: 007C780D
                            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 007C7821
                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 007C782D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                            • String ID: static
                            • API String ID: 2559357485-2160076837
                            • Opcode ID: f1592cb302de7ca1831e5d3f51ab33d6b0e29619e96f1777c3340896a101093f
                            • Instruction ID: 7830611b7099bcab730d472afea017144b44b06f7345f37410367506882f5e77
                            • Opcode Fuzzy Hash: f1592cb302de7ca1831e5d3f51ab33d6b0e29619e96f1777c3340896a101093f
                            • Instruction Fuzzy Hash: AA316D31105119EBDF159FB4DC09FDA3BAAFF09724F11422DFA15A61A0CB39D821DBA4
                            APIs
                            • _memset.LIBCMT ref: 0076707B
                              • Part of subcall function 00768D68: __getptd_noexit.LIBCMT ref: 00768D68
                            • __gmtime64_s.LIBCMT ref: 00767114
                            • __gmtime64_s.LIBCMT ref: 0076714A
                            • __gmtime64_s.LIBCMT ref: 00767167
                            • __allrem.LIBCMT ref: 007671BD
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007671D9
                            • __allrem.LIBCMT ref: 007671F0
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0076720E
                            • __allrem.LIBCMT ref: 00767225
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00767243
                            • __invoke_watson.LIBCMT ref: 007672B4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                            • String ID:
                            • API String ID: 384356119-0
                            • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                            • Instruction ID: 3b310847c9de38a220455a5ef1d5c2b70665dbee75ca86533d60aaadfd52eb9e
                            • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                            • Instruction Fuzzy Hash: 62711971A04706EBDB189E78CC41B5AB3B8BF113A8F14822AFC15E7681E778D940C7A0
                            APIs
                            • _memset.LIBCMT ref: 007A2A31
                            • GetMenuItemInfoW.USER32(00806890,000000FF,00000000,00000030), ref: 007A2A92
                            • SetMenuItemInfoW.USER32(00806890,00000004,00000000,00000030), ref: 007A2AC8
                            • Sleep.KERNEL32(000001F4), ref: 007A2ADA
                            • GetMenuItemCount.USER32(?), ref: 007A2B1E
                            • GetMenuItemID.USER32(?,00000000), ref: 007A2B3A
                            • GetMenuItemID.USER32(?,-00000001), ref: 007A2B64
                            • GetMenuItemID.USER32(?,?), ref: 007A2BA9
                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007A2BEF
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007A2C03
                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007A2C24
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                            • String ID:
                            • API String ID: 4176008265-0
                            • Opcode ID: 63f3c77a391f93bd7908b7cbc7dc6445678efc86f74a99e1744f20947a77ff8c
                            • Instruction ID: d9ee4ad0d84f1a7eaf26f1f4fd6f29280714083bddc63a3a534f9f834cbe52b8
                            • Opcode Fuzzy Hash: 63f3c77a391f93bd7908b7cbc7dc6445678efc86f74a99e1744f20947a77ff8c
                            • Instruction Fuzzy Hash: 3E61B4B0900249EFDB11CF58DD88DBEBBB9FB86314F144659E84193252E739AD16DB30
                            APIs
                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 007C7214
                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 007C7217
                            • GetWindowLongW.USER32(?,000000F0), ref: 007C723B
                            • _memset.LIBCMT ref: 007C724C
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007C725E
                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 007C72D6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$LongWindow_memset
                            • String ID:
                            • API String ID: 830647256-0
                            • Opcode ID: 1d408d121f601613c2f284480233eaf5fb6e5a3ed5a3a03f1a184e85342eaa23
                            • Instruction ID: 37c62cec3a6cbe88d8972d9188e22f3d5dd30ebca521a375a0b0eaf9ac8c5201
                            • Opcode Fuzzy Hash: 1d408d121f601613c2f284480233eaf5fb6e5a3ed5a3a03f1a184e85342eaa23
                            • Instruction Fuzzy Hash: CF615871A00248AFDB14DFA4CC81EEE77F8EB09710F144169FA14A72A1DB74AA55DF60
                            APIs
                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00797135
                            • SafeArrayAllocData.OLEAUT32(?), ref: 0079718E
                            • VariantInit.OLEAUT32(?), ref: 007971A0
                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 007971C0
                            • VariantCopy.OLEAUT32(?,?), ref: 00797213
                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00797227
                            • VariantClear.OLEAUT32(?), ref: 0079723C
                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00797249
                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00797252
                            • VariantClear.OLEAUT32(?), ref: 00797264
                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0079726F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                            • String ID:
                            • API String ID: 2706829360-0
                            • Opcode ID: 8e515826af61692d50d6b64540ad19c13bc38ce89b427dbfedaa0a40d6f3e76e
                            • Instruction ID: 4d286ee817964f5c8e68c46d4e7bcdc9bcf67acfeb8b373cb9e741d263aea7bc
                            • Opcode Fuzzy Hash: 8e515826af61692d50d6b64540ad19c13bc38ce89b427dbfedaa0a40d6f3e76e
                            • Instruction Fuzzy Hash: EE413D75A10219EFCF08DF64DC48DAEBBB9FF48354F00C069E915A7261DB38AA45CB90
                            APIs
                              • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                              • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                            • CoInitialize.OLE32 ref: 007B8718
                            • CoUninitialize.OLE32 ref: 007B8723
                            • CoCreateInstance.OLE32(?,00000000,00000017,007D2BEC,?), ref: 007B8783
                            • IIDFromString.OLE32(?,?), ref: 007B87F6
                            • VariantInit.OLEAUT32(?), ref: 007B8890
                            • VariantClear.OLEAUT32(?), ref: 007B88F1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                            • API String ID: 834269672-1287834457
                            • Opcode ID: f2d9dd6997978231aba8654b0c7b5b68bcfca246e2511d15b4b30261700b5168
                            • Instruction ID: bb3511a7a95ed869154db2e95034762c096fdc233b57cba39c7847dfd7e915aa
                            • Opcode Fuzzy Hash: f2d9dd6997978231aba8654b0c7b5b68bcfca246e2511d15b4b30261700b5168
                            • Instruction Fuzzy Hash: DE617A70608301EFD750DF64C848BAABBE8AF89714F14491DF9859B291DB78ED48CB93
                            APIs
                            • WSAStartup.WSOCK32(00000101,?), ref: 007B5AA6
                            • inet_addr.WSOCK32(?,?,?), ref: 007B5AEB
                            • gethostbyname.WSOCK32(?), ref: 007B5AF7
                            • IcmpCreateFile.IPHLPAPI ref: 007B5B05
                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 007B5B75
                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 007B5B8B
                            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 007B5C00
                            • WSACleanup.WSOCK32 ref: 007B5C06
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                            • String ID: Ping
                            • API String ID: 1028309954-2246546115
                            • Opcode ID: c3b2317cc6b267b684954e51a83ae537f022bb4da954f9a782fef5fd5e9c2fbc
                            • Instruction ID: a4d8fde6644ad48a2ae4c28e3979987c08991ea62bee27868c56caf97e35befd
                            • Opcode Fuzzy Hash: c3b2317cc6b267b684954e51a83ae537f022bb4da954f9a782fef5fd5e9c2fbc
                            • Instruction Fuzzy Hash: 09516D71604B01DFDB10AF24CC89B6BBBE5EF48710F14892AF956DB2A1DB78E840CB55
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 007AB73B
                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 007AB7B1
                            • GetLastError.KERNEL32 ref: 007AB7BB
                            • SetErrorMode.KERNEL32(00000000,READY), ref: 007AB828
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Error$Mode$DiskFreeLastSpace
                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                            • API String ID: 4194297153-14809454
                            • Opcode ID: 7bbf5731df655c913d56af9304814f3aad466dbc5b1bafab2051090b7736f5d6
                            • Instruction ID: 366c9d5519b0c0af4d4782a8de7edd590e99d5e3b179f170b2a6336675e21c07
                            • Opcode Fuzzy Hash: 7bbf5731df655c913d56af9304814f3aad466dbc5b1bafab2051090b7736f5d6
                            • Instruction Fuzzy Hash: A5318575A00209EFDB00EF64C885ABE7BB4EFC6750F14812AE505D7292DBB99941C791
                            APIs
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                              • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 007994F6
                            • GetDlgCtrlID.USER32 ref: 00799501
                            • GetParent.USER32 ref: 0079951D
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00799520
                            • GetDlgCtrlID.USER32(?), ref: 00799529
                            • GetParent.USER32(?), ref: 00799545
                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00799548
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                            • String ID: ComboBox$ListBox
                            • API String ID: 1536045017-1403004172
                            • Opcode ID: 9f442322ec5552cf052f44d96db22a8cd6a84f9bb05c1ebb2190b8c5ec9efc31
                            • Instruction ID: 13c7c4f458d6d5ece8d55d014bec3a75ddfa385ff6a7f5a611b47205ccea3199
                            • Opcode Fuzzy Hash: 9f442322ec5552cf052f44d96db22a8cd6a84f9bb05c1ebb2190b8c5ec9efc31
                            • Instruction Fuzzy Hash: 0821B270A00108FBDF05AB64DC89EFEBB65EF49300F104119F661972E2DB7D5919DB20
                            APIs
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                              • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 007995DF
                            • GetDlgCtrlID.USER32 ref: 007995EA
                            • GetParent.USER32 ref: 00799606
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00799609
                            • GetDlgCtrlID.USER32(?), ref: 00799612
                            • GetParent.USER32(?), ref: 0079962E
                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00799631
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                            • String ID: ComboBox$ListBox
                            • API String ID: 1536045017-1403004172
                            • Opcode ID: 786269c628f38623c0a2045fe9d4138de50d4683b81e7086e8f3f0098588a3c4
                            • Instruction ID: 61be02d7d182cb77f4e31bcc8811686a4bf0c8fb3dec9e16a968d347cfc54180
                            • Opcode Fuzzy Hash: 786269c628f38623c0a2045fe9d4138de50d4683b81e7086e8f3f0098588a3c4
                            • Instruction Fuzzy Hash: 67217474A00108FBDF05AB64DC85EFEBB65EF54300F104159F651972A1DB7D9519DB20
                            APIs
                            • GetParent.USER32 ref: 00799651
                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00799666
                            • _wcscmp.LIBCMT ref: 00799678
                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007996F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClassMessageNameParentSend_wcscmp
                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                            • API String ID: 1704125052-3381328864
                            • Opcode ID: 03dea3054a9ac53f397d589ae8a4856f69013279baa4a10fe608ef1ee7d5d163
                            • Instruction ID: 4e28c8ebde6c5aa5e4028ef1cb43b49c1b8924f96b89d4f836a1ebeae301211d
                            • Opcode Fuzzy Hash: 03dea3054a9ac53f397d589ae8a4856f69013279baa4a10fe608ef1ee7d5d163
                            • Instruction Fuzzy Hash: 0311EC7624830BFAFE052628FC0BDB6779C9F05760F20012EFF11A51D1FE6E69618A58
                            APIs
                            • __swprintf.LIBCMT ref: 007A419D
                            • __swprintf.LIBCMT ref: 007A41AA
                              • Part of subcall function 007638D8: __woutput_l.LIBCMT ref: 00763931
                            • FindResourceW.KERNEL32(?,?,0000000E), ref: 007A41D4
                            • LoadResource.KERNEL32(?,00000000), ref: 007A41E0
                            • LockResource.KERNEL32(00000000), ref: 007A41ED
                            • FindResourceW.KERNEL32(?,?,00000003), ref: 007A420D
                            • LoadResource.KERNEL32(?,00000000), ref: 007A421F
                            • SizeofResource.KERNEL32(?,00000000), ref: 007A422E
                            • LockResource.KERNEL32(?), ref: 007A423A
                            • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 007A429B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                            • String ID:
                            • API String ID: 1433390588-0
                            • Opcode ID: 8c3f90c5dc3182f30d2c9eafa91dd6fd5e08d9282ef1958c5c300706bf96f7aa
                            • Instruction ID: 7bcd3418b59e150cf5e0062dab717042ebe7e058ce62e950bdc52afc62ef09bb
                            • Opcode Fuzzy Hash: 8c3f90c5dc3182f30d2c9eafa91dd6fd5e08d9282ef1958c5c300706bf96f7aa
                            • Instruction Fuzzy Hash: 4A317071A0521AAFDB119F60DC48EBF7BADFF85301F008629F905D2190E7B9DA51CBA4
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 007A1700
                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007A0778,?,00000001), ref: 007A1714
                            • GetWindowThreadProcessId.USER32(00000000), ref: 007A171B
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007A0778,?,00000001), ref: 007A172A
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 007A173C
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007A0778,?,00000001), ref: 007A1755
                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007A0778,?,00000001), ref: 007A1767
                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007A0778,?,00000001), ref: 007A17AC
                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,007A0778,?,00000001), ref: 007A17C1
                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,007A0778,?,00000001), ref: 007A17CC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                            • String ID:
                            • API String ID: 2156557900-0
                            • Opcode ID: 6b2d4320154f45d90a1b855353564e0f7147c955bcc3165f67b881a67a159e9b
                            • Instruction ID: 13fae0d05dcc89b240274d51ba04582dd3a3696ee8f8f9b30a7280168205c307
                            • Opcode Fuzzy Hash: 6b2d4320154f45d90a1b855353564e0f7147c955bcc3165f67b881a67a159e9b
                            • Instruction Fuzzy Hash: 3831C175A00205BFEB119F24DC84F793BFAFB96761F508128F900D62A0DB78AD40CBA4
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Variant$ClearInit$_memset
                            • String ID: ,,}$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                            • API String ID: 2862541840-2286400513
                            • Opcode ID: fbf5c45239de88bb2c8aac7bf8321391ce264e9f3f35214578c24e544bc473bc
                            • Instruction ID: 3d7f4a184b86ffd4a45b69e8a88217d56815dfef92c09f807c263d383ae3ce5b
                            • Opcode Fuzzy Hash: fbf5c45239de88bb2c8aac7bf8321391ce264e9f3f35214578c24e544bc473bc
                            • Instruction Fuzzy Hash: 05918E71A00219ABDF24DFA5C848FEEB7B8EF45714F108159F729AB280D7789945CFA0
                            APIs
                            • EnumChildWindows.USER32(?,0079AA64), ref: 0079A9A2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ChildEnumWindows
                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                            • API String ID: 3555792229-1603158881
                            • Opcode ID: 7594bd65ae70f96790c079c05bad04ce2bef632756a5efa4d75564d42b521479
                            • Instruction ID: c1d162c2a5ba3cf0eff26e8d1d4021a2f4b17180c533e478482c39d7cee092fb
                            • Opcode Fuzzy Hash: 7594bd65ae70f96790c079c05bad04ce2bef632756a5efa4d75564d42b521479
                            • Instruction Fuzzy Hash: 77918070A0160AFBDF08DF60D486BE9FB74BF04314F508129E99AA7251DB387A59CBD1
                            APIs
                            • SetWindowLongW.USER32(?,000000EB), ref: 00742EAE
                              • Part of subcall function 00741DB3: GetClientRect.USER32(?,?), ref: 00741DDC
                              • Part of subcall function 00741DB3: GetWindowRect.USER32(?,?), ref: 00741E1D
                              • Part of subcall function 00741DB3: ScreenToClient.USER32(?,?), ref: 00741E45
                            • GetDC.USER32 ref: 0077CF82
                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0077CF95
                            • SelectObject.GDI32(00000000,00000000), ref: 0077CFA3
                            • SelectObject.GDI32(00000000,00000000), ref: 0077CFB8
                            • ReleaseDC.USER32(?,00000000), ref: 0077CFC0
                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0077D04B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                            • String ID: U
                            • API String ID: 4009187628-3372436214
                            • Opcode ID: 07592c6984fddcdd8c5baf7c872e71a22c77df6d1be7eb185d0c8b20f235c15e
                            • Instruction ID: 865c8e7b3bb46bb6d2d246e48e29557281d557f5b5f57e20298a446f1e5b0b31
                            • Opcode Fuzzy Hash: 07592c6984fddcdd8c5baf7c872e71a22c77df6d1be7eb185d0c8b20f235c15e
                            • Instruction Fuzzy Hash: D171C431500205DFCF219F64CC84ABA7BB6FF49390F14826EFD595A266D7398C62DB60
                            APIs
                              • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                              • Part of subcall function 00742344: GetCursorPos.USER32(?), ref: 00742357
                              • Part of subcall function 00742344: ScreenToClient.USER32(008067B0,?), ref: 00742374
                              • Part of subcall function 00742344: GetAsyncKeyState.USER32(00000001), ref: 00742399
                              • Part of subcall function 00742344: GetAsyncKeyState.USER32(00000002), ref: 007423A7
                            • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 007CC2E4
                            • ImageList_EndDrag.COMCTL32 ref: 007CC2EA
                            • ReleaseCapture.USER32 ref: 007CC2F0
                            • SetWindowTextW.USER32(?,00000000), ref: 007CC39A
                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 007CC3AD
                            • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 007CC48F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                            • String ID: @GUI_DRAGFILE$@GUI_DROPID
                            • API String ID: 1924731296-2107944366
                            • Opcode ID: ed0707613459cf1e37a965a9b5efde3d4826b586fa1e962fc3ab200a1e09fa96
                            • Instruction ID: b3c17ad0e9f54eac4c50fba4a74767fa8034829e586560e2525f86b38b1ab11c
                            • Opcode Fuzzy Hash: ed0707613459cf1e37a965a9b5efde3d4826b586fa1e962fc3ab200a1e09fa96
                            • Instruction Fuzzy Hash: AC517A70204304EFD704DF24CC5AF6A7BE5FB88314F04852DF5959B2A1DB78A969CB52
                            APIs
                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,007CF910), ref: 007B903D
                            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,007CF910), ref: 007B9071
                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 007B91EB
                            • SysFreeString.OLEAUT32(?), ref: 007B9215
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Free$FileLibraryModuleNamePathQueryStringType
                            • String ID:
                            • API String ID: 560350794-0
                            • Opcode ID: a6ebf85d918c7eae33da264f848091a0736ee0da32ed8acc881d3aac43b07401
                            • Instruction ID: 5c94538ae01a1363eee5cd0f5d51f8c12a51aa56d83d58c889bc3d6b932d3aff
                            • Opcode Fuzzy Hash: a6ebf85d918c7eae33da264f848091a0736ee0da32ed8acc881d3aac43b07401
                            • Instruction Fuzzy Hash: 4CF1F771A00209EFDB04DF94C888EEEB7B9FF49315F108459F625AB251DB35AE46CB60
                            APIs
                            • _memset.LIBCMT ref: 007BF9C9
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007BFB5C
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007BFB80
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007BFBC0
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007BFBE2
                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007BFD5E
                            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 007BFD90
                            • CloseHandle.KERNEL32(?), ref: 007BFDBF
                            • CloseHandle.KERNEL32(?), ref: 007BFE36
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                            • String ID:
                            • API String ID: 4090791747-0
                            • Opcode ID: a1bd4970fd8656cf64967156d46763cedcf7b3fc8aadb238ec1a09d61425a61a
                            • Instruction ID: 4fe69d96d24c11fd7396d41deaa11dcdbb71e127f411db4fd8077ccd05cd8c2f
                            • Opcode Fuzzy Hash: a1bd4970fd8656cf64967156d46763cedcf7b3fc8aadb238ec1a09d61425a61a
                            • Instruction Fuzzy Hash: C2E1D631204341DFCB14EF24C895BABBBE1AF85710F14856DF89A9B2A2DB39DC45CB52
                            APIs
                              • Part of subcall function 007A48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007A38D3,?), ref: 007A48C7
                              • Part of subcall function 007A48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007A38D3,?), ref: 007A48E0
                              • Part of subcall function 007A4CD3: GetFileAttributesW.KERNEL32(?,007A3947), ref: 007A4CD4
                            • lstrcmpiW.KERNEL32(?,?), ref: 007A4FE2
                            • _wcscmp.LIBCMT ref: 007A4FFC
                            • MoveFileW.KERNEL32(?,?), ref: 007A5017
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                            • String ID:
                            • API String ID: 793581249-0
                            • Opcode ID: f69965f11becab18780042d00dd36261c1d3a676a1e67d109cbc649bcd2f2db4
                            • Instruction ID: fabfa94172260674d5f27cc6d88066c7523c40329aceaa7fc519a058e6352de3
                            • Opcode Fuzzy Hash: f69965f11becab18780042d00dd36261c1d3a676a1e67d109cbc649bcd2f2db4
                            • Instruction Fuzzy Hash: 865182B21087849BC724DB60C8859DFB3ECAFC5300F004A2EF589D3152EF79A289C766
                            APIs
                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 007C896E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: InvalidateRect
                            • String ID:
                            • API String ID: 634782764-0
                            • Opcode ID: be89be742395e499b415e2966515e4568375de11eb464ce65f6b8c70ce90a0ce
                            • Instruction ID: 770193d115e8cba2685cfa9248f579b1d3953150de8f893f9c5da058bc117f46
                            • Opcode Fuzzy Hash: be89be742395e499b415e2966515e4568375de11eb464ce65f6b8c70ce90a0ce
                            • Instruction Fuzzy Hash: B5518230510209FEDF609F24CC89FAD7BA5BB05310F60812EF515E66A1DF79AD909B92
                            APIs
                            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0077C547
                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0077C569
                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0077C581
                            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0077C59F
                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0077C5C0
                            • DestroyIcon.USER32(00000000), ref: 0077C5CF
                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0077C5EC
                            • DestroyIcon.USER32(?), ref: 0077C5FB
                              • Part of subcall function 007CA71E: DeleteObject.GDI32(00000000), ref: 007CA757
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                            • String ID:
                            • API String ID: 2819616528-0
                            • Opcode ID: ab998372f4c572b41028417eb9d3145f7d1e6ff417b82456fb2efb2dbaf77ed8
                            • Instruction ID: 3192e3503cfe7d54ecbf66b6df98cb2d291239c7fc79f2b366dc6bd516fd7773
                            • Opcode Fuzzy Hash: ab998372f4c572b41028417eb9d3145f7d1e6ff417b82456fb2efb2dbaf77ed8
                            • Instruction Fuzzy Hash: DA514970600209EFDB24DF24CC45FAA3BA5FB58350F50852CF906972A1EB79E9A1DB60
                            APIs
                              • Part of subcall function 0079AE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 0079AE77
                              • Part of subcall function 0079AE57: GetCurrentThreadId.KERNEL32 ref: 0079AE7E
                              • Part of subcall function 0079AE57: AttachThreadInput.USER32(00000000,?,00799B65,?,00000001), ref: 0079AE85
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00799B70
                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00799B8D
                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00799B90
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00799B99
                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00799BB7
                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00799BBA
                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00799BC3
                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00799BDA
                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00799BDD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                            • String ID:
                            • API String ID: 2014098862-0
                            • Opcode ID: db75caaa445c2a796872b65d0379e167cbc9247110f65a4fa0508c1881446b1f
                            • Instruction ID: d24d8801b5fc8973d622b36a08664adccd239b2206ee2e9235306efd4e87d69b
                            • Opcode Fuzzy Hash: db75caaa445c2a796872b65d0379e167cbc9247110f65a4fa0508c1881446b1f
                            • Instruction Fuzzy Hash: CF11E5B1550218FFFA106B64EC4EF6A3B1EDB4C755F114429F344AB0A0CAF75C10DAA8
                            APIs
                            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00798A84,00000B00,?,?), ref: 00798E0C
                            • HeapAlloc.KERNEL32(00000000,?,00798A84,00000B00,?,?), ref: 00798E13
                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00798A84,00000B00,?,?), ref: 00798E28
                            • GetCurrentProcess.KERNEL32(?,00000000,?,00798A84,00000B00,?,?), ref: 00798E30
                            • DuplicateHandle.KERNEL32(00000000,?,00798A84,00000B00,?,?), ref: 00798E33
                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00798A84,00000B00,?,?), ref: 00798E43
                            • GetCurrentProcess.KERNEL32(00798A84,00000000,?,00798A84,00000B00,?,?), ref: 00798E4B
                            • DuplicateHandle.KERNEL32(00000000,?,00798A84,00000B00,?,?), ref: 00798E4E
                            • CreateThread.KERNEL32(00000000,00000000,00798E74,00000000,00000000,00000000), ref: 00798E68
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                            • String ID:
                            • API String ID: 1957940570-0
                            • Opcode ID: 2e4eca02cc2f91572e7a92a32d85efa40526a2ed900000a9d3236de6f6e3e3d3
                            • Instruction ID: 7f1bb77e811dee341387f0a00a60f81c00bd63995a15f1754925bef618d68dab
                            • Opcode Fuzzy Hash: 2e4eca02cc2f91572e7a92a32d85efa40526a2ed900000a9d3236de6f6e3e3d3
                            • Instruction Fuzzy Hash: 4801BBB5240308FFE710ABA5DC4DF6B7BADEB89711F048425FA05DB2A1CA749C00CB24
                            APIs
                              • Part of subcall function 00797652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?,?,0079799D), ref: 0079766F
                              • Part of subcall function 00797652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?), ref: 0079768A
                              • Part of subcall function 00797652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?), ref: 00797698
                              • Part of subcall function 00797652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?), ref: 007976A8
                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 007B9B1B
                            • _memset.LIBCMT ref: 007B9B28
                            • _memset.LIBCMT ref: 007B9C6B
                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 007B9C97
                            • CoTaskMemFree.OLE32(?), ref: 007B9CA2
                            Strings
                            • NULL Pointer assignment, xrefs: 007B9CF0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                            • String ID: NULL Pointer assignment
                            • API String ID: 1300414916-2785691316
                            • Opcode ID: 8926d5431121316393aaba4b1fe688bb008c79ff8f82c23fd3555eebcb7ed52a
                            • Instruction ID: 3adc7c694173db17737113857bd7654a69438b4fdf346619cc6841c95e5b3182
                            • Opcode Fuzzy Hash: 8926d5431121316393aaba4b1fe688bb008c79ff8f82c23fd3555eebcb7ed52a
                            • Instruction Fuzzy Hash: 02913A71D00229EBDF10DFA5DC85EDEBBB9AF08710F20815AF619A7281DB755A44CFA0
                            APIs
                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 007C7093
                            • SendMessageW.USER32(?,00001036,00000000,?), ref: 007C70A7
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 007C70C1
                            • _wcscat.LIBCMT ref: 007C711C
                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 007C7133
                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 007C7161
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Window_wcscat
                            • String ID: SysListView32
                            • API String ID: 307300125-78025650
                            • Opcode ID: 993247d255c351aff7e305bba8e82e585717ed9e1b41f273540af0d36be4311b
                            • Instruction ID: f8ddd87b321d4d95bae0fda4e1b36faf5fb89d5e950cb87a879facd668b58f68
                            • Opcode Fuzzy Hash: 993247d255c351aff7e305bba8e82e585717ed9e1b41f273540af0d36be4311b
                            • Instruction Fuzzy Hash: 9E418071A04308EBDB259F64CC89FEA77A9EF08350F10452EF544A7292D6799D84CB50
                            APIs
                              • Part of subcall function 007A3E91: CreateToolhelp32Snapshot.KERNEL32 ref: 007A3EB6
                              • Part of subcall function 007A3E91: Process32FirstW.KERNEL32(00000000,?), ref: 007A3EC4
                              • Part of subcall function 007A3E91: CloseHandle.KERNEL32(00000000), ref: 007A3F8E
                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007BECB8
                            • GetLastError.KERNEL32 ref: 007BECCB
                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007BECFA
                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 007BED77
                            • GetLastError.KERNEL32(00000000), ref: 007BED82
                            • CloseHandle.KERNEL32(00000000), ref: 007BEDB7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                            • String ID: SeDebugPrivilege
                            • API String ID: 2533919879-2896544425
                            • Opcode ID: 985521397750016eb0be7090b924fc18e72d6869cb02a26af829e6d4ad3e2de8
                            • Instruction ID: 8c2e5e2a77aa1f19cb4e560f5b186247666a7d5e05d3fba7261831addc805ab8
                            • Opcode Fuzzy Hash: 985521397750016eb0be7090b924fc18e72d6869cb02a26af829e6d4ad3e2de8
                            • Instruction Fuzzy Hash: C8416D71304201DFDB14EF24CC99FAEB7A5AF81714F188459F9429B3D2DBB9A804CB95
                            APIs
                            • LoadIconW.USER32(00000000,00007F03), ref: 007A32C5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: IconLoad
                            • String ID: blank$info$question$stop$warning
                            • API String ID: 2457776203-404129466
                            • Opcode ID: d9aab84d83676eba7552c040e2b3b4f271fc461ef67dbc394dae5c05c1bad109
                            • Instruction ID: f2a7a512a361290fe1000465c98cf7ed735ca5a8be7ea981776ee82d080c3afb
                            • Opcode Fuzzy Hash: d9aab84d83676eba7552c040e2b3b4f271fc461ef67dbc394dae5c05c1bad109
                            • Instruction Fuzzy Hash: 4311277120874AFBA7055F54DC43E6AB79CFF5B370F20012AF905A62C1E66D6B4045A5
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 007A454E
                            • LoadStringW.USER32(00000000), ref: 007A4555
                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 007A456B
                            • LoadStringW.USER32(00000000), ref: 007A4572
                            • _wprintf.LIBCMT ref: 007A4598
                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007A45B6
                            Strings
                            • %s (%d) : ==> %s: %s %s, xrefs: 007A4593
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: HandleLoadModuleString$Message_wprintf
                            • String ID: %s (%d) : ==> %s: %s %s
                            • API String ID: 3648134473-3128320259
                            • Opcode ID: c93fb3f7a32decd6834fe203b20443b92fea94a3e32a700a36f615e088e581b5
                            • Instruction ID: 879c4cc96d094385de12386eeb8b01cf3c53890151dfbf553744359d658030ae
                            • Opcode Fuzzy Hash: c93fb3f7a32decd6834fe203b20443b92fea94a3e32a700a36f615e088e581b5
                            • Instruction Fuzzy Hash: 31014FF2900208BFE710A7A09D89EE6776DD708301F0045A9FB49E2151EA799E858B79
                            APIs
                              • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                            • GetSystemMetrics.USER32(0000000F), ref: 007CD78A
                            • GetSystemMetrics.USER32(0000000F), ref: 007CD7AA
                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 007CD9E5
                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 007CDA03
                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 007CDA24
                            • ShowWindow.USER32(00000003,00000000), ref: 007CDA43
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 007CDA68
                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 007CDA8B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                            • String ID:
                            • API String ID: 1211466189-0
                            • Opcode ID: aecdd5736bd455be79ade44e5eac42e487e14e32d52e005bd789a0e3b7cded41
                            • Instruction ID: e5279f44af32e31d29a74c47782785dce06884480f213f7ac37949663715a84b
                            • Opcode Fuzzy Hash: aecdd5736bd455be79ade44e5eac42e487e14e32d52e005bd789a0e3b7cded41
                            • Instruction Fuzzy Hash: EDB16675600225ABDF24CF68C989BAD7BB2FF48701F09C17DED48AA295D738AD50CB50
                            APIs
                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0077C417,00000004,00000000,00000000,00000000), ref: 00742ACF
                            • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0077C417,00000004,00000000,00000000,00000000,000000FF), ref: 00742B17
                            • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0077C417,00000004,00000000,00000000,00000000), ref: 0077C46A
                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0077C417,00000004,00000000,00000000,00000000), ref: 0077C4D6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ShowWindow
                            • String ID:
                            • API String ID: 1268545403-0
                            • Opcode ID: e56b09644d14eb17d772f763626af8bfd7462cf44a6e9073ac25e864579c64e0
                            • Instruction ID: fe0f39db565c08c7c2ded63c5c65075e36318be8394fa8c2e30e001288d03f67
                            • Opcode Fuzzy Hash: e56b09644d14eb17d772f763626af8bfd7462cf44a6e9073ac25e864579c64e0
                            • Instruction Fuzzy Hash: AA4109313047C0AACB368B289C9CB7A7B92EB46300F98C81DFC4B96562D77D9867D711
                            APIs
                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 007A737F
                              • Part of subcall function 00760FF6: std::exception::exception.LIBCMT ref: 0076102C
                              • Part of subcall function 00760FF6: __CxxThrowException@8.LIBCMT ref: 00761041
                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 007A73B6
                            • EnterCriticalSection.KERNEL32(?), ref: 007A73D2
                            • _memmove.LIBCMT ref: 007A7420
                            • _memmove.LIBCMT ref: 007A743D
                            • LeaveCriticalSection.KERNEL32(?), ref: 007A744C
                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 007A7461
                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 007A7480
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                            • String ID:
                            • API String ID: 256516436-0
                            • Opcode ID: b38bf2028e6d78a9a689a36fda7974fa93dd8db56001d6f21b3e0f54265adca6
                            • Instruction ID: 2dd99ce8f3e731823fb13e2b5c9f4ce325c2ff8782aa1cdb07f24249cf01bdc0
                            • Opcode Fuzzy Hash: b38bf2028e6d78a9a689a36fda7974fa93dd8db56001d6f21b3e0f54265adca6
                            • Instruction Fuzzy Hash: CF315E71904205EBCF10DF54DC89EAF7B78FF45710B1481A9FD05AB246DB389A14DBA4
                            APIs
                            • DeleteObject.GDI32(00000000), ref: 007C645A
                            • GetDC.USER32(00000000), ref: 007C6462
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007C646D
                            • ReleaseDC.USER32(00000000,00000000), ref: 007C6479
                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 007C64B5
                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 007C64C6
                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,007C9299,?,?,000000FF,00000000,?,000000FF,?), ref: 007C6500
                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 007C6520
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                            • String ID:
                            • API String ID: 3864802216-0
                            • Opcode ID: 0f7b148435aa437e337aab6df0ebc80c63f3adddc382c860035075f3a692ecc2
                            • Instruction ID: e20adb1e902ad624a568a56617864ef936e5923b15c06f6289b10144af4e798a
                            • Opcode Fuzzy Hash: 0f7b148435aa437e337aab6df0ebc80c63f3adddc382c860035075f3a692ecc2
                            • Instruction Fuzzy Hash: 49317172101214BFEB118F50DC8AFEA3FAAEF09761F044069FE08EA291D6799C51CB64
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID:
                            • API String ID: 2931989736-0
                            • Opcode ID: 77806152166b8e4de3732fbf2727b582039b5fccc4ecf06f9b957c8082da8783
                            • Instruction ID: d3ced51db49e95f389d9ff3b3ea37667f3da85f7285b8a409d8aca1ac98c503c
                            • Opcode Fuzzy Hash: 77806152166b8e4de3732fbf2727b582039b5fccc4ecf06f9b957c8082da8783
                            • Instruction Fuzzy Hash: 4221C5A5740209F7DE16A524AD4AFBB336CAF20394F480021FD0A96383EB9DDE12C5B5
                            APIs
                              • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                              • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                              • Part of subcall function 0075FEC6: _wcscpy.LIBCMT ref: 0075FEE9
                            • _wcstok.LIBCMT ref: 007AEEFF
                            • _wcscpy.LIBCMT ref: 007AEF8E
                            • _memset.LIBCMT ref: 007AEFC1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                            • String ID: X
                            • API String ID: 774024439-3081909835
                            • Opcode ID: e95b6f02d701ff541614376a6a740fad0b96105cf02ff708a2f1f84dde958da1
                            • Instruction ID: 8a4bb28cfc8f137a90101e6f102bdc5b2073b6d9cf3d7ae3c3a945b1e218202f
                            • Opcode Fuzzy Hash: e95b6f02d701ff541614376a6a740fad0b96105cf02ff708a2f1f84dde958da1
                            • Instruction Fuzzy Hash: 83C15E71608340DFC714EF64C889A5BB7E4EF85310F044A2DF999972A2DB38ED45CB92
                            APIs
                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 007B6F14
                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 007B6F35
                            • WSAGetLastError.WSOCK32(00000000), ref: 007B6F48
                            • htons.WSOCK32(?,?,?,00000000,?), ref: 007B6FFE
                            • inet_ntoa.WSOCK32(?), ref: 007B6FBB
                              • Part of subcall function 0079AE14: _strlen.LIBCMT ref: 0079AE1E
                              • Part of subcall function 0079AE14: _memmove.LIBCMT ref: 0079AE40
                            • _strlen.LIBCMT ref: 007B7058
                            • _memmove.LIBCMT ref: 007B70C1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                            • String ID:
                            • API String ID: 3619996494-0
                            • Opcode ID: c052a2aaf3e9bbedb423c2d3483726edf0c4888117767e861eaaf6c732924a2c
                            • Instruction ID: 0240ebc278e896e8e4027d541d202a562f2e514912fad71a0aafb3c77b21ff17
                            • Opcode Fuzzy Hash: c052a2aaf3e9bbedb423c2d3483726edf0c4888117767e861eaaf6c732924a2c
                            • Instruction Fuzzy Hash: 8481C071508300EBD714EB24CC8AFABB7E9AF84714F14891DF6559B292DB78ED00C792
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ea0df0869582e175b50b10455c4faf6d7be59d0383ee8612273fe21e18704b43
                            • Instruction ID: 7cea7008b06800937215fd80c0f608d5b79ba23e21d66c47aa918031c130bb4c
                            • Opcode Fuzzy Hash: ea0df0869582e175b50b10455c4faf6d7be59d0383ee8612273fe21e18704b43
                            • Instruction Fuzzy Hash: 53714930900109EFCB04EF98CC89ABEBB79FF85354F548159F915AA251C738AA91CFA4
                            APIs
                            • IsWindow.USER32(012B5F48), ref: 007CB6A5
                            • IsWindowEnabled.USER32(012B5F48), ref: 007CB6B1
                            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 007CB795
                            • SendMessageW.USER32(012B5F48,000000B0,?,?), ref: 007CB7CC
                            • IsDlgButtonChecked.USER32(?,?), ref: 007CB809
                            • GetWindowLongW.USER32(012B5F48,000000EC), ref: 007CB82B
                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 007CB843
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                            • String ID:
                            • API String ID: 4072528602-0
                            • Opcode ID: 4b9931c1d305c0e134107d0a4671b027242f8bdb47e2054c90c9e6f422b6dac7
                            • Instruction ID: a9a711a9eb0d7abe3720eb0868ed829f0d2376fc5a429ec298adfe5898edf307
                            • Opcode Fuzzy Hash: 4b9931c1d305c0e134107d0a4671b027242f8bdb47e2054c90c9e6f422b6dac7
                            • Instruction Fuzzy Hash: ED717B34600204EFDB259FA4C896FBA7BB9FF49300F14406EF946A72A1C739A961DB54
                            APIs
                            • _memset.LIBCMT ref: 007BF75C
                            • _memset.LIBCMT ref: 007BF825
                            • ShellExecuteExW.SHELL32(?), ref: 007BF86A
                              • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                              • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                              • Part of subcall function 0075FEC6: _wcscpy.LIBCMT ref: 0075FEE9
                            • GetProcessId.KERNEL32(00000000), ref: 007BF8E1
                            • CloseHandle.KERNEL32(00000000), ref: 007BF910
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                            • String ID: @
                            • API String ID: 3522835683-2766056989
                            • Opcode ID: f33c34a3dce8e113d957494a3c2d97ee3b9ce9b52a9f93fc3ac60902c9c103fc
                            • Instruction ID: 72473310afa3ef2986645c98dc849b8f272220c5d4b05c87bfc902c059eb9c75
                            • Opcode Fuzzy Hash: f33c34a3dce8e113d957494a3c2d97ee3b9ce9b52a9f93fc3ac60902c9c103fc
                            • Instruction Fuzzy Hash: 21619175A00619DFCF14DF64C889AAEBBF5FF49710F148469E846AB351DB38AE40CB90
                            APIs
                            • GetParent.USER32(?), ref: 007A149C
                            • GetKeyboardState.USER32(?), ref: 007A14B1
                            • SetKeyboardState.USER32(?), ref: 007A1512
                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 007A1540
                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 007A155F
                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 007A15A5
                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007A15C8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: f11b0a7cef37031e536c5e79d097f2975e8d5c33f7708e2a47df86fc0875ee11
                            • Instruction ID: dea99fbb1171aa78a51f49bb6313ab7c9ec9c623ca9092660c57724debe0ed6e
                            • Opcode Fuzzy Hash: f11b0a7cef37031e536c5e79d097f2975e8d5c33f7708e2a47df86fc0875ee11
                            • Instruction Fuzzy Hash: 6B51E3A0A047D53EFB3646388C49BBABFA95B87304F4C8689E1D5968C2C7DCEC94D750
                            APIs
                            • GetParent.USER32(00000000), ref: 007A12B5
                            • GetKeyboardState.USER32(?), ref: 007A12CA
                            • SetKeyboardState.USER32(?), ref: 007A132B
                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 007A1357
                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 007A1374
                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007A13B8
                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007A13D9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: 8de0cf3cdd514234a57482334db403233e4aac302a05b3a31d20b58a7659f2e0
                            • Instruction ID: 13a84f0a77030e3236216f1570880e5b60e27362b9f5c1ff58f86e878011df2e
                            • Opcode Fuzzy Hash: 8de0cf3cdd514234a57482334db403233e4aac302a05b3a31d20b58a7659f2e0
                            • Instruction Fuzzy Hash: CB51F5A0A047D57DFF3287248C55BBABFA96F87300F488689E1D45A8C2D39DEC94D760
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _wcsncpy$LocalTime
                            • String ID:
                            • API String ID: 2945705084-0
                            • Opcode ID: effef77e7da6996b99151d3bcf21fb0d6ac692929d7132f3711c370b3ce96cf8
                            • Instruction ID: 69f0f1ecff2175bc05423447bb0cbfb1046a36513bc623b68f473bcf5b0e4938
                            • Opcode Fuzzy Hash: effef77e7da6996b99151d3bcf21fb0d6ac692929d7132f3711c370b3ce96cf8
                            • Instruction Fuzzy Hash: 8A41B465D20528BACB10EBB4C88E9CF77A8AF05710F508562F919E3122F738E715C7A9
                            APIs
                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0079DAC5
                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0079DAFB
                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0079DB0C
                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0079DB8E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorMode$AddressCreateInstanceProc
                            • String ID: ,,}$DllGetClassObject
                            • API String ID: 753597075-3102866830
                            • Opcode ID: 95234b0b5aa39459c5bec4c14192e92afc723eaf4dd867d442d8872fb792cf07
                            • Instruction ID: 90823a02f4ca3c37f890400dd8333bb1436af14033872b77ef078ddd3a611282
                            • Opcode Fuzzy Hash: 95234b0b5aa39459c5bec4c14192e92afc723eaf4dd867d442d8872fb792cf07
                            • Instruction Fuzzy Hash: A34173B1600208EFDF25CF55D884A9A7BBAEF44350F1580AEED059F205D7B9DD44DBA0
                            APIs
                              • Part of subcall function 007A48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007A38D3,?), ref: 007A48C7
                              • Part of subcall function 007A48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007A38D3,?), ref: 007A48E0
                            • lstrcmpiW.KERNEL32(?,?), ref: 007A38F3
                            • _wcscmp.LIBCMT ref: 007A390F
                            • MoveFileW.KERNEL32(?,?), ref: 007A3927
                            • _wcscat.LIBCMT ref: 007A396F
                            • SHFileOperationW.SHELL32(?), ref: 007A39DB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                            • String ID: \*.*
                            • API String ID: 1377345388-1173974218
                            • Opcode ID: ff396776b7224d9855497e0bc3ea9c0bcac7025839e42b06517b7f41f0750f56
                            • Instruction ID: 35906942c65a66e11a8619dbe45c4e7caa15a8655528c42b05fe0898aee672e9
                            • Opcode Fuzzy Hash: ff396776b7224d9855497e0bc3ea9c0bcac7025839e42b06517b7f41f0750f56
                            • Instruction Fuzzy Hash: C7417EB250C3849AC755EF64C4859EBB7E8AFC9344F000A2EB48AC3151EB7DE649C752
                            APIs
                            • _memset.LIBCMT ref: 007C7519
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007C75C0
                            • IsMenu.USER32(?), ref: 007C75D8
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007C7620
                            • DrawMenuBar.USER32 ref: 007C7633
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Menu$Item$DrawInfoInsert_memset
                            • String ID: 0
                            • API String ID: 3866635326-4108050209
                            • Opcode ID: 366a9ee8e53184603213ccc64e4331a8af3842ffd211bfd602faeae92e9d87ad
                            • Instruction ID: 6e292fd27c2fd8aac3e4d5fbdd21cba43513a23c5378f7b96d61705732d97703
                            • Opcode Fuzzy Hash: 366a9ee8e53184603213ccc64e4331a8af3842ffd211bfd602faeae92e9d87ad
                            • Instruction Fuzzy Hash: C9412975A04609EFDB14DF54E885E9ABBF9FB04310F04812DE915A7250DB34AD60CF90
                            APIs
                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 007C125C
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007C1286
                            • FreeLibrary.KERNEL32(00000000), ref: 007C133D
                              • Part of subcall function 007C122D: RegCloseKey.ADVAPI32(?), ref: 007C12A3
                              • Part of subcall function 007C122D: FreeLibrary.KERNEL32(?), ref: 007C12F5
                              • Part of subcall function 007C122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 007C1318
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 007C12E0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: EnumFreeLibrary$CloseDeleteOpen
                            • String ID:
                            • API String ID: 395352322-0
                            • Opcode ID: ee7f67177ea491ea9ec7c994ff78816159ab315a8a3df5e76be0670408f9a739
                            • Instruction ID: cbfe36349fa1abc49b1514ecd3a1be04a02fa9d70ad95d56ed86a7eed25e2ce2
                            • Opcode Fuzzy Hash: ee7f67177ea491ea9ec7c994ff78816159ab315a8a3df5e76be0670408f9a739
                            • Instruction Fuzzy Hash: 30311AB5901119BFDB149B90DC89EFEB7BCEF09304F40417DE501E2152EB789E859BA4
                            APIs
                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 007C655B
                            • GetWindowLongW.USER32(012B5F48,000000F0), ref: 007C658E
                            • GetWindowLongW.USER32(012B5F48,000000F0), ref: 007C65C3
                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 007C65F5
                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 007C661F
                            • GetWindowLongW.USER32(00000000,000000F0), ref: 007C6630
                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 007C664A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: LongWindow$MessageSend
                            • String ID:
                            • API String ID: 2178440468-0
                            • Opcode ID: 756848dbdf07da931597e462ad3dd0c7313d945fa0ea05ae811b912d6b88998b
                            • Instruction ID: 5f442b175042aaae9da2674affee27b2cdecb7cf7142b2fab27fb1d5e46cf8a0
                            • Opcode Fuzzy Hash: 756848dbdf07da931597e462ad3dd0c7313d945fa0ea05ae811b912d6b88998b
                            • Instruction Fuzzy Hash: 0031F230604251AFDB208F18ECC5F653BE2FB4A714F2941ACF6119B2B6CB79E860DB51
                            APIs
                              • Part of subcall function 007B80A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 007B80CB
                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 007B64D9
                            • WSAGetLastError.WSOCK32(00000000), ref: 007B64E8
                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 007B6521
                            • connect.WSOCK32(00000000,?,00000010), ref: 007B652A
                            • WSAGetLastError.WSOCK32 ref: 007B6534
                            • closesocket.WSOCK32(00000000), ref: 007B655D
                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 007B6576
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                            • String ID:
                            • API String ID: 910771015-0
                            • Opcode ID: 5091122fec54d794ee2ace699e3c1900fdf36d03f81eebcccaa87865a5f9a8e3
                            • Instruction ID: dd251e40aa15cbc26dc46ba00d6d4e0e1d5e6d2434fc490df8e9ca35459ff855
                            • Opcode Fuzzy Hash: 5091122fec54d794ee2ace699e3c1900fdf36d03f81eebcccaa87865a5f9a8e3
                            • Instruction Fuzzy Hash: 25317071600118ABDB10AF24DC89FFA7BADEF45714F048069FA05A7291DB7CAD14CBA1
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0079E0FA
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0079E120
                            • SysAllocString.OLEAUT32(00000000), ref: 0079E123
                            • SysAllocString.OLEAUT32 ref: 0079E144
                            • SysFreeString.OLEAUT32 ref: 0079E14D
                            • StringFromGUID2.OLE32(?,?,00000028), ref: 0079E167
                            • SysAllocString.OLEAUT32(?), ref: 0079E175
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                            • String ID:
                            • API String ID: 3761583154-0
                            • Opcode ID: 91e6d3069ec657679320a27f7009fc9f8e92ea9ad842ecf9fbf54a23766fd4a0
                            • Instruction ID: cf20648179013a51dbc2df4094612ea6caca6d642fc52b7e1f8a5bb8a6eeb4c0
                            • Opcode Fuzzy Hash: 91e6d3069ec657679320a27f7009fc9f8e92ea9ad842ecf9fbf54a23766fd4a0
                            • Instruction Fuzzy Hash: 5E213E35604208AFDF10DFA8EC88DAB77EDEB09760B548139F915CB260DA79DD418B64
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __wcsnicmp
                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                            • API String ID: 1038674560-2734436370
                            • Opcode ID: c3503bba703e3b8a3dbeae85a34b508e198e1bbe807bca26358b5b8ab438a73a
                            • Instruction ID: 3abf143fa19bad792b2ed5cbfbf2a70c5ab8edda8603bf30611c8150145cb23c
                            • Opcode Fuzzy Hash: c3503bba703e3b8a3dbeae85a34b508e198e1bbe807bca26358b5b8ab438a73a
                            • Instruction Fuzzy Hash: 022167B2204650E6DB30EA30FC16EA77398DF52308F148036FC86C7182EB5DA982D2A1
                            APIs
                              • Part of subcall function 00741D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00741D73
                              • Part of subcall function 00741D35: GetStockObject.GDI32(00000011), ref: 00741D87
                              • Part of subcall function 00741D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00741D91
                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 007C78A1
                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 007C78AE
                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 007C78B9
                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 007C78C8
                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 007C78D4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$CreateObjectStockWindow
                            • String ID: Msctls_Progress32
                            • API String ID: 1025951953-3636473452
                            • Opcode ID: 9d0b9e1f6cc50b083413a8439e64752df6a80b24e9d7558b745d48a7dae360c9
                            • Instruction ID: 61497c25623c2be0e9ef22eafe773013d3bc5b631bad23e2f7340be676ea95aa
                            • Opcode Fuzzy Hash: 9d0b9e1f6cc50b083413a8439e64752df6a80b24e9d7558b745d48a7dae360c9
                            • Instruction Fuzzy Hash: 20118EB2510219BFEF159E60CC85EE77F6DEF08768F014119FB04A2090CB769C21DBA4
                            APIs
                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00764292,?), ref: 007641E3
                            • GetProcAddress.KERNEL32(00000000), ref: 007641EA
                            • EncodePointer.KERNEL32(00000000), ref: 007641F6
                            • DecodePointer.KERNEL32(00000001,00764292,?), ref: 00764213
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                            • String ID: RoInitialize$combase.dll
                            • API String ID: 3489934621-340411864
                            • Opcode ID: d7710ead828d1b6c9b9df05c0eafef3a09f7c6a4b91d57cfb5d411ffb8738413
                            • Instruction ID: a2bdada31b4880c5ad06118be6aeb9f90ec5a55ea3ae4029fdddeeb1ea32fc6e
                            • Opcode Fuzzy Hash: d7710ead828d1b6c9b9df05c0eafef3a09f7c6a4b91d57cfb5d411ffb8738413
                            • Instruction Fuzzy Hash: 5DE01AF06D0340AFEB606BB0EC0DF043AA6B761B02F109428FA12D51A0DBBE4096CF04
                            APIs
                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,007641B8), ref: 007642B8
                            • GetProcAddress.KERNEL32(00000000), ref: 007642BF
                            • EncodePointer.KERNEL32(00000000), ref: 007642CA
                            • DecodePointer.KERNEL32(007641B8), ref: 007642E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                            • String ID: RoUninitialize$combase.dll
                            • API String ID: 3489934621-2819208100
                            • Opcode ID: 79c3aed1890fb2d6fc0d2eaa85fb609d178d94432ba7333986cb699fb2f88a11
                            • Instruction ID: f1263e1cdd8bc453698ee793f206382f5940e163b71952c4d29e75daf11a4af6
                            • Opcode Fuzzy Hash: 79c3aed1890fb2d6fc0d2eaa85fb609d178d94432ba7333986cb699fb2f88a11
                            • Instruction Fuzzy Hash: D8E0B6B86C1300AFEB509B61EC0DF053BA6B725742F20902AF601E11A0CBBC4545CA18
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memmove$__itow__swprintf
                            • String ID:
                            • API String ID: 3253778849-0
                            • Opcode ID: 2ac74d2e030658137b5ee0dcb8b02025e330d3075783c8fac3e9a08f62e1acb0
                            • Instruction ID: 4372021567804b7caedbba176daefdfd24f37961e123e7dcb2f434cb5d978950
                            • Opcode Fuzzy Hash: 2ac74d2e030658137b5ee0dcb8b02025e330d3075783c8fac3e9a08f62e1acb0
                            • Instruction Fuzzy Hash: 62619E7050465ADBCF15EF20CC89EFF37A8AF86308F484619F9565B292DB3CA941CB91
                            APIs
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                              • Part of subcall function 007C10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C0038,?,?), ref: 007C10BC
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C0548
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007C0588
                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 007C05AB
                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 007C05D4
                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 007C0617
                            • RegCloseKey.ADVAPI32(00000000), ref: 007C0624
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                            • String ID:
                            • API String ID: 4046560759-0
                            • Opcode ID: 10ed509092688973c76206c5ebf36df46cef712a539011365d178f0fc0e1aa31
                            • Instruction ID: 7b9da34c6bba837485368fa470703942797f2d5de764c2e0e7b3a3058d9b317e
                            • Opcode Fuzzy Hash: 10ed509092688973c76206c5ebf36df46cef712a539011365d178f0fc0e1aa31
                            • Instruction Fuzzy Hash: 3D515B31208200DFCB14EF24D889E6BBBE9FF85714F04891DF545972A2DB39E914CB92
                            APIs
                            • GetMenu.USER32(?), ref: 007C5A82
                            • GetMenuItemCount.USER32(00000000), ref: 007C5AB9
                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 007C5AE1
                            • GetMenuItemID.USER32(?,?), ref: 007C5B50
                            • GetSubMenu.USER32(?,?), ref: 007C5B5E
                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 007C5BAF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Menu$Item$CountMessagePostString
                            • String ID:
                            • API String ID: 650687236-0
                            • Opcode ID: f9e17cffffa5f6ddb9fefe4e96fbfc5565fca5a4974e513b6f9a54740814f39a
                            • Instruction ID: a05f3b84c21065d6d53a2293c26c851cfb8f2ceaaae01d8b10cc9883faac15cc
                            • Opcode Fuzzy Hash: f9e17cffffa5f6ddb9fefe4e96fbfc5565fca5a4974e513b6f9a54740814f39a
                            • Instruction Fuzzy Hash: 4F517C71A00615EFCF119F64C849EAEBBB5EF48310F14846DE902B7351CB79BE818B90
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 0079F3F7
                            • VariantClear.OLEAUT32(00000013), ref: 0079F469
                            • VariantClear.OLEAUT32(00000000), ref: 0079F4C4
                            • _memmove.LIBCMT ref: 0079F4EE
                            • VariantClear.OLEAUT32(?), ref: 0079F53B
                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0079F569
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Variant$Clear$ChangeInitType_memmove
                            • String ID:
                            • API String ID: 1101466143-0
                            • Opcode ID: fc8f66f1386676552e985a4082975e95808b32ac4310dba31537806b1e4b5f9d
                            • Instruction ID: e2d15f042882cbc0fe7161fd1d638da9425ec03ca4cce67600c3ed781136aa26
                            • Opcode Fuzzy Hash: fc8f66f1386676552e985a4082975e95808b32ac4310dba31537806b1e4b5f9d
                            • Instruction Fuzzy Hash: 55515BB5A00249DFCB14DF58D884EAAB7B9FF48314B158169ED59DB310D734E911CBA0
                            APIs
                            • _memset.LIBCMT ref: 007A2747
                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007A2792
                            • IsMenu.USER32(00000000), ref: 007A27B2
                            • CreatePopupMenu.USER32 ref: 007A27E6
                            • GetMenuItemCount.USER32(000000FF), ref: 007A2844
                            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 007A2875
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                            • String ID:
                            • API String ID: 3311875123-0
                            • Opcode ID: 5c24e153475812e1f53c2d6f276c8cd4948a55222f544fff38585d85d50cc03a
                            • Instruction ID: 0b5b9fc11ab283e443d981332fe552fca385094ab1a32987e463f071f9cad9b8
                            • Opcode Fuzzy Hash: 5c24e153475812e1f53c2d6f276c8cd4948a55222f544fff38585d85d50cc03a
                            • Instruction Fuzzy Hash: 6A51AF70A00205EFDF24CF6CD988AAEBBF5AF86314F104369F8119B292D77C9906CB51
                            APIs
                              • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                            • BeginPaint.USER32(?,?,?,?,?,?), ref: 0074179A
                            • GetWindowRect.USER32(?,?), ref: 007417FE
                            • ScreenToClient.USER32(?,?), ref: 0074181B
                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0074182C
                            • EndPaint.USER32(?,?), ref: 00741876
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: PaintWindow$BeginClientLongRectScreenViewport
                            • String ID:
                            • API String ID: 1827037458-0
                            • Opcode ID: 11b883745224dca8f0573ef2a92cc220d6f22ec6cb88ca08460b13ff57a71b9e
                            • Instruction ID: 7998233bbb3046e8145ec00bae823af131333d7f4eb8426c47a036d688eca060
                            • Opcode Fuzzy Hash: 11b883745224dca8f0573ef2a92cc220d6f22ec6cb88ca08460b13ff57a71b9e
                            • Instruction Fuzzy Hash: 9E419D70200201AFD711EF24CC88FB67BE9FB49734F048669F9A4861A1D7399895DB61
                            APIs
                            • ShowWindow.USER32(008067B0,00000000,012B5F48,?,?,008067B0,?,007CB862,?,?), ref: 007CB9CC
                            • EnableWindow.USER32(00000000,00000000), ref: 007CB9F0
                            • ShowWindow.USER32(008067B0,00000000,012B5F48,?,?,008067B0,?,007CB862,?,?), ref: 007CBA50
                            • ShowWindow.USER32(00000000,00000004,?,007CB862,?,?), ref: 007CBA62
                            • EnableWindow.USER32(00000000,00000001), ref: 007CBA86
                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 007CBAA9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$Show$Enable$MessageSend
                            • String ID:
                            • API String ID: 642888154-0
                            • Opcode ID: 97668e55cde857a477091ecd7bd80bf0b75529678a3909af162a620a2064a2af
                            • Instruction ID: 6cd250efac2e6801d9a871c9c36a35bb2f0ba250135c1fc755558817ecc1369e
                            • Opcode Fuzzy Hash: 97668e55cde857a477091ecd7bd80bf0b75529678a3909af162a620a2064a2af
                            • Instruction Fuzzy Hash: 6E413034600641EFDB25CF64C48AF997BE1BB05314F1882BDFA499F6A2C73AE845CB51
                            APIs
                            • GetForegroundWindow.USER32(?,?,?,?,?,?,007B5134,?,?,00000000,00000001), ref: 007B73BF
                              • Part of subcall function 007B3C94: GetWindowRect.USER32(?,?), ref: 007B3CA7
                            • GetDesktopWindow.USER32 ref: 007B73E9
                            • GetWindowRect.USER32(00000000), ref: 007B73F0
                            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 007B7422
                              • Part of subcall function 007A54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007A555E
                            • GetCursorPos.USER32(?), ref: 007B744E
                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007B74AC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                            • String ID:
                            • API String ID: 4137160315-0
                            • Opcode ID: 9b5a6ee37486dfaa52f935e750f73c5e65d835f74c1b819d5c0c642c5425b99a
                            • Instruction ID: e90308b04508060461cf15bd6784f81bf477bc56addb18a4f0039d1166592298
                            • Opcode Fuzzy Hash: 9b5a6ee37486dfaa52f935e750f73c5e65d835f74c1b819d5c0c642c5425b99a
                            • Instruction Fuzzy Hash: 1A31F432508345ABD724DF14D849F9BBBAAFFC8304F004929F58997191CA34EA08CB92
                            APIs
                              • Part of subcall function 007985F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00798608
                              • Part of subcall function 007985F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00798612
                              • Part of subcall function 007985F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00798621
                              • Part of subcall function 007985F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00798628
                              • Part of subcall function 007985F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0079863E
                            • GetLengthSid.ADVAPI32(?,00000000,00798977), ref: 00798DAC
                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00798DB8
                            • HeapAlloc.KERNEL32(00000000), ref: 00798DBF
                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 00798DD8
                            • GetProcessHeap.KERNEL32(00000000,00000000,00798977), ref: 00798DEC
                            • HeapFree.KERNEL32(00000000), ref: 00798DF3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                            • String ID:
                            • API String ID: 3008561057-0
                            • Opcode ID: 7d78e92ef06a1986e89726b1310d98ad2ecbf7c266d619fda7124704a3527862
                            • Instruction ID: 508dfecba419bc5a1955d00cb68ec04a0b7943749169d11430820db7f579405c
                            • Opcode Fuzzy Hash: 7d78e92ef06a1986e89726b1310d98ad2ecbf7c266d619fda7124704a3527862
                            • Instruction Fuzzy Hash: C011E131600604FFDF549F64EC09FAE7B6AEF4A315F14802EE84597251CB3A9D40CB65
                            APIs
                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00798B2A
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00798B31
                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00798B40
                            • CloseHandle.KERNEL32(00000004), ref: 00798B4B
                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00798B7A
                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00798B8E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                            • String ID:
                            • API String ID: 1413079979-0
                            • Opcode ID: 355c798f58f62954bb6bd0bde963a3d4fe0eb0a4ac6b7e9313d7c2aa4d3d792a
                            • Instruction ID: cc28a529230bacdd680ac1e5558e72dc8e4f383e61aefcc6f3ac3495f31cf008
                            • Opcode Fuzzy Hash: 355c798f58f62954bb6bd0bde963a3d4fe0eb0a4ac6b7e9313d7c2aa4d3d792a
                            • Instruction Fuzzy Hash: EC112CB2501249ABDF01CFA4ED49FDE7BAAFF49704F084069FE04A2160C77A9D649B61
                            APIs
                              • Part of subcall function 007412F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0074134D
                              • Part of subcall function 007412F3: SelectObject.GDI32(?,00000000), ref: 0074135C
                              • Part of subcall function 007412F3: BeginPath.GDI32(?), ref: 00741373
                              • Part of subcall function 007412F3: SelectObject.GDI32(?,00000000), ref: 0074139C
                            • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 007CC1C4
                            • LineTo.GDI32(00000000,00000003,?), ref: 007CC1D8
                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 007CC1E6
                            • LineTo.GDI32(00000000,00000000,?), ref: 007CC1F6
                            • EndPath.GDI32(00000000), ref: 007CC206
                            • StrokePath.GDI32(00000000), ref: 007CC216
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                            • String ID:
                            • API String ID: 43455801-0
                            • Opcode ID: 4efc129cc4bf99825e54f3c89debcc26fa4a63ab8f894e1caf9a92ca283a9bfa
                            • Instruction ID: bc9f277f5b2fa0496b97221c5a633e913b4a864b100d156cb8ec4df21e9bd4ad
                            • Opcode Fuzzy Hash: 4efc129cc4bf99825e54f3c89debcc26fa4a63ab8f894e1caf9a92ca283a9bfa
                            • Instruction Fuzzy Hash: FA111B7640010CBFDF129F90DC88FAA7FADFB08354F048029FA189A161D7759DA5DBA0
                            APIs
                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 007603D3
                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 007603DB
                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 007603E6
                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 007603F1
                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 007603F9
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00760401
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Virtual
                            • String ID:
                            • API String ID: 4278518827-0
                            • Opcode ID: 5529f75d7a6b3cd75b4a604ba21a46c43238f385dd926afb38c93e4185e5e001
                            • Instruction ID: 7c72e4cc83a71e60546b4ddd755dce747b71ac33224df5f9c8ceeb27f9176874
                            • Opcode Fuzzy Hash: 5529f75d7a6b3cd75b4a604ba21a46c43238f385dd926afb38c93e4185e5e001
                            • Instruction Fuzzy Hash: 440148B0901759BDE3008F5A8C85A52FFA8FF19354F00411BE15847941C7B5A864CBE5
                            APIs
                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007A569B
                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007A56B1
                            • GetWindowThreadProcessId.USER32(?,?), ref: 007A56C0
                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007A56CF
                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007A56D9
                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007A56E0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                            • String ID:
                            • API String ID: 839392675-0
                            • Opcode ID: 16fea4d1bbfe8a5ab494583a21018baee700417d38f9f40824520c181d666208
                            • Instruction ID: 47a249ca35835e095d4be32aa2359b52127ef4a131c0545b284ea7a85121d192
                            • Opcode Fuzzy Hash: 16fea4d1bbfe8a5ab494583a21018baee700417d38f9f40824520c181d666208
                            • Instruction Fuzzy Hash: 6AF03032241558BBE7215BA2DC0DEEF7F7DEFC6B11F04416DFA04E1050D7A91A0186B9
                            APIs
                            • InterlockedExchange.KERNEL32(?,?), ref: 007A74E5
                            • EnterCriticalSection.KERNEL32(?,?,00751044,?,?), ref: 007A74F6
                            • TerminateThread.KERNEL32(00000000,000001F6,?,00751044,?,?), ref: 007A7503
                            • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00751044,?,?), ref: 007A7510
                              • Part of subcall function 007A6ED7: CloseHandle.KERNEL32(00000000,?,007A751D,?,00751044,?,?), ref: 007A6EE1
                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 007A7523
                            • LeaveCriticalSection.KERNEL32(?,?,00751044,?,?), ref: 007A752A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                            • String ID:
                            • API String ID: 3495660284-0
                            • Opcode ID: 78e1abb270d4064ce1a86a5bcca936b07edb7167744caf2224b73753873c5d1e
                            • Instruction ID: 3147cce728af5b7c4b370b43b2d3f4298667349ebdd8eb65a3eb7e24aa457189
                            • Opcode Fuzzy Hash: 78e1abb270d4064ce1a86a5bcca936b07edb7167744caf2224b73753873c5d1e
                            • Instruction Fuzzy Hash: 08F03A3A544612EBDB161B64EC8CDEE772AFF45302B04463AF202910A0CB795811CA54
                            APIs
                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00798E7F
                            • UnloadUserProfile.USERENV(?,?), ref: 00798E8B
                            • CloseHandle.KERNEL32(?), ref: 00798E94
                            • CloseHandle.KERNEL32(?), ref: 00798E9C
                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00798EA5
                            • HeapFree.KERNEL32(00000000), ref: 00798EAC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                            • String ID:
                            • API String ID: 146765662-0
                            • Opcode ID: b2ca2e09e2ca254eb1686e887b3966bcc6a03551158cc9da49719b017fac04b3
                            • Instruction ID: 9fb6c19a1b5142b2a27ed841e2c9f7799956dafae32b7ede7bc083ba5f41278d
                            • Opcode Fuzzy Hash: b2ca2e09e2ca254eb1686e887b3966bcc6a03551158cc9da49719b017fac04b3
                            • Instruction Fuzzy Hash: 4EE0C236004805FBDA011FE2EC0CD0ABF6AFB89322B54823AF21981070CB3A9820DB58
                            APIs
                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,007D2C7C,?), ref: 00797C32
                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,007D2C7C,?), ref: 00797C4A
                            • CLSIDFromProgID.OLE32(?,?,00000000,007CFB80,000000FF,?,00000000,00000800,00000000,?,007D2C7C,?), ref: 00797C6F
                            • _memcmp.LIBCMT ref: 00797C90
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FromProg$FreeTask_memcmp
                            • String ID: ,,}
                            • API String ID: 314563124-3650289849
                            • Opcode ID: 6a04a984a4e08478d6bad451372fd00e402ecc5899a21f99576a0c2adebb8194
                            • Instruction ID: fb1a40c762a44753fa4d40c33ae263ed656e63f1ff20877c2f070da21900759b
                            • Opcode Fuzzy Hash: 6a04a984a4e08478d6bad451372fd00e402ecc5899a21f99576a0c2adebb8194
                            • Instruction Fuzzy Hash: 98810A71A10109EFCF04DF94C988EEEB7B9FF89315F204198E506AB250DB75AE06CB60
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 007B8928
                            • CharUpperBuffW.USER32(?,?), ref: 007B8A37
                            • VariantClear.OLEAUT32(?), ref: 007B8BAF
                              • Part of subcall function 007A7804: VariantInit.OLEAUT32(00000000), ref: 007A7844
                              • Part of subcall function 007A7804: VariantCopy.OLEAUT32(00000000,?), ref: 007A784D
                              • Part of subcall function 007A7804: VariantClear.OLEAUT32(00000000), ref: 007A7859
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Variant$ClearInit$BuffCharCopyUpper
                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                            • API String ID: 4237274167-1221869570
                            • Opcode ID: e55f9ae8a1fe3d70b26a48ff61a794e264b961c730b09c8638635dd73c26a12e
                            • Instruction ID: 825d1761ffb048bb71b2fdf9af20bf101a3dac3155f5cdf6298e35a08e743ab5
                            • Opcode Fuzzy Hash: e55f9ae8a1fe3d70b26a48ff61a794e264b961c730b09c8638635dd73c26a12e
                            • Instruction Fuzzy Hash: D69182B1604301DFCB54DF24C484A9BBBE8EF89354F04896EF99A8B361DB35E905CB52
                            APIs
                              • Part of subcall function 0075FEC6: _wcscpy.LIBCMT ref: 0075FEE9
                            • _memset.LIBCMT ref: 007A3077
                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007A30A6
                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007A3159
                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 007A3187
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ItemMenu$Info$Default_memset_wcscpy
                            • String ID: 0
                            • API String ID: 4152858687-4108050209
                            • Opcode ID: f4f064817139aa4037c2b5ff909796dbcdf63f7e60461e854019576cbbc0715e
                            • Instruction ID: d0560f59650dde8cd7de4b3f1a89daf1f11600862ba3f50c64bbf060c7f38519
                            • Opcode Fuzzy Hash: f4f064817139aa4037c2b5ff909796dbcdf63f7e60461e854019576cbbc0715e
                            • Instruction Fuzzy Hash: 5D51CF316087049FD7659F28D849A6BBBE5EFC6320F044B2EF895D3191EB78CE448792
                            APIs
                            • _memset.LIBCMT ref: 007A2CAF
                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 007A2CCB
                            • DeleteMenu.USER32(?,00000007,00000000), ref: 007A2D11
                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00806890,00000000), ref: 007A2D5A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Menu$Delete$InfoItem_memset
                            • String ID: 0
                            • API String ID: 1173514356-4108050209
                            • Opcode ID: dd51d65c91ff69548aa7319cf60c9f764e2faa49cd77f0d91a0222115e00a2e5
                            • Instruction ID: 94250951c2c15c52c61f09d6edab89bcde827879571be886bff9536484898f88
                            • Opcode Fuzzy Hash: dd51d65c91ff69548aa7319cf60c9f764e2faa49cd77f0d91a0222115e00a2e5
                            • Instruction Fuzzy Hash: C7419F302043019FD724DF28D844B1ABBE9AFC6320F14465DF96697293DB78E906CBA2
                            APIs
                            • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 007BDAD9
                              • Part of subcall function 007479AB: _memmove.LIBCMT ref: 007479F9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: BuffCharLower_memmove
                            • String ID: cdecl$none$stdcall$winapi
                            • API String ID: 3425801089-567219261
                            • Opcode ID: 68499a0e1ac7eb474199d3518e851f37740d6598b064717b718fa7a5aba998b3
                            • Instruction ID: 3c9a8fa0523de0500422047339cf123182a4a5820525a791b5fd7f13d5d4192f
                            • Opcode Fuzzy Hash: 68499a0e1ac7eb474199d3518e851f37740d6598b064717b718fa7a5aba998b3
                            • Instruction Fuzzy Hash: 3E317EB1600619EBCF14EF64C885AEFB7B4FF05310B108629E966A7791DB39AD05CB80
                            APIs
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                              • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007993F6
                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00799409
                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00799439
                              • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$_memmove$ClassName
                            • String ID: ComboBox$ListBox
                            • API String ID: 365058703-1403004172
                            • Opcode ID: 0c51f62ca4753489ce0b962ec4b65c5d6d00134b11b8fb55026bdb0c647c8f1c
                            • Instruction ID: 66c18e6f009a9665a80e09213f793fe817dd09e8a74bdb3c97a02d0a62e51ac8
                            • Opcode Fuzzy Hash: 0c51f62ca4753489ce0b962ec4b65c5d6d00134b11b8fb55026bdb0c647c8f1c
                            • Instruction Fuzzy Hash: EF21D5B1A00104FBEF18AB64EC89DFFB768DF05350B14811DFA25A72E1DB3D490A9610
                            APIs
                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007B1B40
                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007B1B66
                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007B1B96
                            • InternetCloseHandle.WININET(00000000), ref: 007B1BDD
                              • Part of subcall function 007B2777: GetLastError.KERNEL32(?,?,007B1B0B,00000000,00000000,00000001), ref: 007B278C
                              • Part of subcall function 007B2777: SetEvent.KERNEL32(?,?,007B1B0B,00000000,00000000,00000001), ref: 007B27A1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                            • String ID:
                            • API String ID: 3113390036-3916222277
                            • Opcode ID: d5d290cd9a3c5df6848c9830adebc0057687e47c69f471bafc5621469c6f5805
                            • Instruction ID: c63f26fe3634e651f7745f99c5b454a0ec668988b4d8159f0b08bf79cdc6fe79
                            • Opcode Fuzzy Hash: d5d290cd9a3c5df6848c9830adebc0057687e47c69f471bafc5621469c6f5805
                            • Instruction Fuzzy Hash: 42219DB1600208BFEB119F609CD9FFF77EDEB49744F90412EF505A6240EA289E0597B5
                            APIs
                              • Part of subcall function 00741D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00741D73
                              • Part of subcall function 00741D35: GetStockObject.GDI32(00000011), ref: 00741D87
                              • Part of subcall function 00741D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00741D91
                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 007C66D0
                            • LoadLibraryW.KERNEL32(?), ref: 007C66D7
                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 007C66EC
                            • DestroyWindow.USER32(?), ref: 007C66F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                            • String ID: SysAnimate32
                            • API String ID: 4146253029-1011021900
                            • Opcode ID: 39e685dc3cea26f774f29023fd5a67ac7800c7e96b4d4cf0e8da18fbb3267ad1
                            • Instruction ID: b937948b3065570e207cd00cd7924e883f32caa4af0bdbc62f598a078d768e5e
                            • Opcode Fuzzy Hash: 39e685dc3cea26f774f29023fd5a67ac7800c7e96b4d4cf0e8da18fbb3267ad1
                            • Instruction Fuzzy Hash: BB2177B120020AABEF105E64ECC0FBB37ADEB59368F10462DFA10A21A0D779CC919761
                            APIs
                            • GetStdHandle.KERNEL32(0000000C), ref: 007A705E
                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007A7091
                            • GetStdHandle.KERNEL32(0000000C), ref: 007A70A3
                            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 007A70DD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CreateHandle$FilePipe
                            • String ID: nul
                            • API String ID: 4209266947-2873401336
                            • Opcode ID: 4e8c3ee4621983b4fcd647bc3a7ff138702c16da3236b5c6b09c1356c251924f
                            • Instruction ID: a923c4743bd330a53fb7a71782eb78824f474b8597614b2a3698b2020cd16153
                            • Opcode Fuzzy Hash: 4e8c3ee4621983b4fcd647bc3a7ff138702c16da3236b5c6b09c1356c251924f
                            • Instruction Fuzzy Hash: 4B216274604209AFDB249F39DC05AAB77B8BF86720F208729FDA1D72D0E7749850CB54
                            APIs
                            • GetStdHandle.KERNEL32(000000F6), ref: 007A712B
                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007A715D
                            • GetStdHandle.KERNEL32(000000F6), ref: 007A716E
                            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 007A71A8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CreateHandle$FilePipe
                            • String ID: nul
                            • API String ID: 4209266947-2873401336
                            • Opcode ID: 868e69173d2bb02e10d369eb3f208ce96aeba358897f26b32bf4d762fc56ea5f
                            • Instruction ID: 64bde6a56acc971758be7316cfc8de15f711399fa09159654df914a4f3360cc4
                            • Opcode Fuzzy Hash: 868e69173d2bb02e10d369eb3f208ce96aeba358897f26b32bf4d762fc56ea5f
                            • Instruction Fuzzy Hash: 1C21B6755042099BDB289F68DC04EA9B7E8BFD6720F204B19FDA0D32D0E7749841C755
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 007AAEBF
                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 007AAF13
                            • __swprintf.LIBCMT ref: 007AAF2C
                            • SetErrorMode.KERNEL32(00000000,00000001,00000000,007CF910), ref: 007AAF6A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorMode$InformationVolume__swprintf
                            • String ID: %lu
                            • API String ID: 3164766367-685833217
                            • Opcode ID: c5bce20e773f8181861ca9a268f6453ccd151a5d2bbf8ff53a1fa85745247362
                            • Instruction ID: ef00a15c492345c7e8c267871aaa0b4f8b08d1deddfc27e4cdbecbf6210b8054
                            • Opcode Fuzzy Hash: c5bce20e773f8181861ca9a268f6453ccd151a5d2bbf8ff53a1fa85745247362
                            • Instruction Fuzzy Hash: 78215370A0010DEFCB10DF65CD89DAE7BB9EF89704B108069F909EB251DB75EA41CB61
                            APIs
                              • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                              • Part of subcall function 0079A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0079A399
                              • Part of subcall function 0079A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0079A3AC
                              • Part of subcall function 0079A37C: GetCurrentThreadId.KERNEL32 ref: 0079A3B3
                              • Part of subcall function 0079A37C: AttachThreadInput.USER32(00000000), ref: 0079A3BA
                            • GetFocus.USER32 ref: 0079A554
                              • Part of subcall function 0079A3C5: GetParent.USER32(?), ref: 0079A3D3
                            • GetClassNameW.USER32(?,?,00000100), ref: 0079A59D
                            • EnumChildWindows.USER32(?,0079A615), ref: 0079A5C5
                            • __swprintf.LIBCMT ref: 0079A5DF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                            • String ID: %s%d
                            • API String ID: 1941087503-1110647743
                            • Opcode ID: 713a37d3555bbcaadc54cf697a0dfbdda9dc86767ef1457cff3b755355587b8c
                            • Instruction ID: b508513256b911fcf845bac9eb7b13072a8fe9a9dad7435218c2ffc59710cf73
                            • Opcode Fuzzy Hash: 713a37d3555bbcaadc54cf697a0dfbdda9dc86767ef1457cff3b755355587b8c
                            • Instruction Fuzzy Hash: 76119D71601209BBDF10BF70EC89FEA3779AF49700F044079FA08AA152CB7859458BB5
                            APIs
                            • CharUpperBuffW.USER32(?,?), ref: 007A2048
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: BuffCharUpper
                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                            • API String ID: 3964851224-769500911
                            • Opcode ID: 3891c086e4dfbd63acf5318c1fb7737d9d6c24aa0dd47713dfc28371185be652
                            • Instruction ID: a1761c3c198c9dd88953fea82f2920920202bfe87c6036ebf602d632678b78cc
                            • Opcode Fuzzy Hash: 3891c086e4dfbd63acf5318c1fb7737d9d6c24aa0dd47713dfc28371185be652
                            • Instruction Fuzzy Hash: 2C110C7091010DEFCF00EFA8D9514FEB7B4BF56304B508669E95667352DB3A5907CB50
                            APIs
                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 007BEF1B
                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 007BEF4B
                            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 007BF07E
                            • CloseHandle.KERNEL32(?), ref: 007BF0FF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Process$CloseCountersHandleInfoMemoryOpen
                            • String ID:
                            • API String ID: 2364364464-0
                            • Opcode ID: bc9402cfd9038c2c4653645b3b7594bee12aafa5b5b816f8bce3b3bc480ad011
                            • Instruction ID: 917403c96d2cb6552651be404c6401965444c34bf92ef2c26c3aee7f7a965015
                            • Opcode Fuzzy Hash: bc9402cfd9038c2c4653645b3b7594bee12aafa5b5b816f8bce3b3bc480ad011
                            • Instruction Fuzzy Hash: 89812F716047119FD720EF28C88AB6AB7E5AF88B10F14881DF5959B392DB78AD408B51
                            APIs
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                              • Part of subcall function 007C10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007C0038,?,?), ref: 007C10BC
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007C0388
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007C03C7
                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 007C040E
                            • RegCloseKey.ADVAPI32(?,?), ref: 007C043A
                            • RegCloseKey.ADVAPI32(00000000), ref: 007C0447
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                            • String ID:
                            • API String ID: 3440857362-0
                            • Opcode ID: 572af0fc282d11d08d7693d49ac09db54502cf4ee3c521df10e386947e784ebc
                            • Instruction ID: 17f08284faba3437e000bc1ef8cf24156504fc4da2c2815867174515bf84fb5a
                            • Opcode Fuzzy Hash: 572af0fc282d11d08d7693d49ac09db54502cf4ee3c521df10e386947e784ebc
                            • Instruction Fuzzy Hash: 1A516871208240EFC704EB64C885F6BB7E9FF84704F44892DF595872A2DB38E904CB92
                            APIs
                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 007AE88A
                            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 007AE8B3
                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 007AE8F2
                              • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                              • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 007AE917
                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 007AE91F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                            • String ID:
                            • API String ID: 1389676194-0
                            • Opcode ID: 8cbe792114ee17fded4bb7f478bf7388b00f05347e3793844fa78434b1477a4e
                            • Instruction ID: 6adf26e3f3871fa23eec1d604818fb618601751ffd4afdec62b94a36b0dfcfed
                            • Opcode Fuzzy Hash: 8cbe792114ee17fded4bb7f478bf7388b00f05347e3793844fa78434b1477a4e
                            • Instruction Fuzzy Hash: 34513C35A00205DFCF01EF64C985AAEBBF5FF49310B1480A9E949AB362CB39ED11DB51
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c6b967f55660792fecb01f112a8adcd2cddb6b604816c219b51fa30ec06823ad
                            • Instruction ID: bed551a4e037207a396cb196b228057381cf19079c6c0481e9cbf3505e325f20
                            • Opcode Fuzzy Hash: c6b967f55660792fecb01f112a8adcd2cddb6b604816c219b51fa30ec06823ad
                            • Instruction Fuzzy Hash: 4241133590028CBFC720DB28CC58FA9BBA5FB09316F14426DF915A72E0D738AE51DA51
                            APIs
                            • GetCursorPos.USER32(?), ref: 00742357
                            • ScreenToClient.USER32(008067B0,?), ref: 00742374
                            • GetAsyncKeyState.USER32(00000001), ref: 00742399
                            • GetAsyncKeyState.USER32(00000002), ref: 007423A7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AsyncState$ClientCursorScreen
                            • String ID:
                            • API String ID: 4210589936-0
                            • Opcode ID: ec1abf910f6cf7121dd9495d5c8054542fcee2a3085305575a9947c56b65f356
                            • Instruction ID: 99443f3ba2714374a64d6e1600daf4e93d6aa6069f8ec0c4d4c56c11e84155df
                            • Opcode Fuzzy Hash: ec1abf910f6cf7121dd9495d5c8054542fcee2a3085305575a9947c56b65f356
                            • Instruction Fuzzy Hash: 52418371604119FBDF169F64C848EEDBB74FB09360F60836EF92896291C7385960DB91
                            APIs
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0079695D
                            • TranslateAcceleratorW.USER32(?,?,?), ref: 007969A9
                            • TranslateMessage.USER32(?), ref: 007969D2
                            • DispatchMessageW.USER32(?), ref: 007969DC
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007969EB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Message$PeekTranslate$AcceleratorDispatch
                            • String ID:
                            • API String ID: 2108273632-0
                            • Opcode ID: baf2f1df87e29a43cee0574bdd3a2f0b0935591668784c43afa861f86e512ea3
                            • Instruction ID: b9f7db4e434d4eda836ac2d717dcbaeb5b04bb5c4796f959319459f6a04e8061
                            • Opcode Fuzzy Hash: baf2f1df87e29a43cee0574bdd3a2f0b0935591668784c43afa861f86e512ea3
                            • Instruction Fuzzy Hash: 2631A171904246AEDF60CF74AC44FB67BACFB01324F14836DE421D61A1E73DA8A5D7A0
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 00798F12
                            • PostMessageW.USER32(?,00000201,00000001), ref: 00798FBC
                            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00798FC4
                            • PostMessageW.USER32(?,00000202,00000000), ref: 00798FD2
                            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00798FDA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessagePostSleep$RectWindow
                            • String ID:
                            • API String ID: 3382505437-0
                            • Opcode ID: 5a2ca293252baa8c49d9e0e3229a8242e05c884d8d6f33e8b6fe4d98d40ace50
                            • Instruction ID: 3bbf6822114c9c590751a835af2c70b4ba75677bdec589b94a363f981551c43b
                            • Opcode Fuzzy Hash: 5a2ca293252baa8c49d9e0e3229a8242e05c884d8d6f33e8b6fe4d98d40ace50
                            • Instruction Fuzzy Hash: BD31E071500219EFDF00CF68E94CA9E7BB7EB05315F108229F925EA2D0C7B89910CB91
                            APIs
                            • IsWindowVisible.USER32(?), ref: 0079B6C7
                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0079B6E4
                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0079B71C
                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0079B742
                            • _wcsstr.LIBCMT ref: 0079B74C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                            • String ID:
                            • API String ID: 3902887630-0
                            • Opcode ID: 99c38a37800c3b70b27614ff799746cd34435a1da237176930a399851c2714ec
                            • Instruction ID: 5e343c0832524ebb0b7a213e6ae5f0c5b6c87d91b895e218bb82d2ece334bf39
                            • Opcode Fuzzy Hash: 99c38a37800c3b70b27614ff799746cd34435a1da237176930a399851c2714ec
                            • Instruction Fuzzy Hash: C721D331204204BAEF255B79BD49E7B7B99DB89710F00812AFC06DA2A1EB69D84097A0
                            APIs
                              • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                            • GetWindowLongW.USER32(?,000000F0), ref: 007CB44C
                            • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 007CB471
                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 007CB489
                            • GetSystemMetrics.USER32(00000004), ref: 007CB4B2
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,007B1184,00000000), ref: 007CB4D0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$Long$MetricsSystem
                            • String ID:
                            • API String ID: 2294984445-0
                            • Opcode ID: e562998bf4f1f7325088c53e8c8386c73e8b156c0e90f135f05a96d116993ca6
                            • Instruction ID: 4662c2ea851dfa51196f0599d8c08061cf991cdf266387feb5f8c0d042baa8d7
                            • Opcode Fuzzy Hash: e562998bf4f1f7325088c53e8c8386c73e8b156c0e90f135f05a96d116993ca6
                            • Instruction Fuzzy Hash: 12217E31918695AFCB188F38DC05F6A37A5FB05720F14873CF926D61E2E7349A20DB80
                            APIs
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00799802
                              • Part of subcall function 00747D2C: _memmove.LIBCMT ref: 00747D66
                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00799834
                            • __itow.LIBCMT ref: 0079984C
                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00799874
                            • __itow.LIBCMT ref: 00799885
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$__itow$_memmove
                            • String ID:
                            • API String ID: 2983881199-0
                            • Opcode ID: 3218be2ef67fc0a494c72194256a040ca00062bcf74b58e90c8602d32caad1cd
                            • Instruction ID: 98aaccf390788f3a1c4ee45288da864a061c49f2a000a41728cd2f6a18903a17
                            • Opcode Fuzzy Hash: 3218be2ef67fc0a494c72194256a040ca00062bcf74b58e90c8602d32caad1cd
                            • Instruction Fuzzy Hash: 0E21C871B00204EBEF109A699C8AEEE7BA9EF49710F04402DFE05EB291D7788D45D791
                            APIs
                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0074134D
                            • SelectObject.GDI32(?,00000000), ref: 0074135C
                            • BeginPath.GDI32(?), ref: 00741373
                            • SelectObject.GDI32(?,00000000), ref: 0074139C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ObjectSelect$BeginCreatePath
                            • String ID:
                            • API String ID: 3225163088-0
                            • Opcode ID: d1ae86fa8622b14e628ec7878712927396f4997d0e22596fd0643058441f7432
                            • Instruction ID: 7071c7c4011331d5a4675f314893410dc11712e7615ec78855b0a6d09183fec9
                            • Opcode Fuzzy Hash: d1ae86fa8622b14e628ec7878712927396f4997d0e22596fd0643058441f7432
                            • Instruction Fuzzy Hash: 83213C70900208EBDB11AF25DC08B697BF9FB00761F54C22AF814965B0E77999F1DB91
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID:
                            • API String ID: 2931989736-0
                            • Opcode ID: a72ca8b9e2307e14118e30d0a9a107919b7d1ae4c76293f3f55756f58233b465
                            • Instruction ID: 39cabc5d71b22d178c5954b235eff008297d426db698fb67b7fd320484f5b6bd
                            • Opcode Fuzzy Hash: a72ca8b9e2307e14118e30d0a9a107919b7d1ae4c76293f3f55756f58233b465
                            • Instruction Fuzzy Hash: E401B9F168410D7BEE05A620AD46F6B775C9B21394F484012FD0597383EA9CDE12C6F9
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 007A4D5C
                            • __beginthreadex.LIBCMT ref: 007A4D7A
                            • MessageBoxW.USER32(?,?,?,?), ref: 007A4D8F
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 007A4DA5
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007A4DAC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                            • String ID:
                            • API String ID: 3824534824-0
                            • Opcode ID: 2bf4777a78b178b52ce0bb44420acc2d975e1f58d0d00218350d7021f639b33a
                            • Instruction ID: 3cf8f0cba221e72be81b65c82e51999d3a8c790e92c1850b48e0a23fd4fb779a
                            • Opcode Fuzzy Hash: 2bf4777a78b178b52ce0bb44420acc2d975e1f58d0d00218350d7021f639b33a
                            • Instruction Fuzzy Hash: FA1108B2A04248BBC7119BB89C08E9A7FADFBC5320F184369F914D3250D6B98D1087A0
                            APIs
                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00798766
                            • GetLastError.KERNEL32(?,0079822A,?,?,?), ref: 00798770
                            • GetProcessHeap.KERNEL32(00000008,?,?,0079822A,?,?,?), ref: 0079877F
                            • HeapAlloc.KERNEL32(00000000,?,0079822A,?,?,?), ref: 00798786
                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0079879D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 842720411-0
                            • Opcode ID: 3fcb905a85b6432beafa1cc37e207525efedf98fb79358a92d8eaf0d9da6826a
                            • Instruction ID: 3edbedf021b855bfa219283c762672f3da99d45766a82df9f2239b7a2b4a04a1
                            • Opcode Fuzzy Hash: 3fcb905a85b6432beafa1cc37e207525efedf98fb79358a92d8eaf0d9da6826a
                            • Instruction Fuzzy Hash: 07014B71200208FFDB204FE6EC88D6B7FADEF8A355B204429F849C6260DA358C00DA60
                            APIs
                            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007A5502
                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 007A5510
                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 007A5518
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 007A5522
                            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007A555E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: PerformanceQuery$CounterSleep$Frequency
                            • String ID:
                            • API String ID: 2833360925-0
                            • Opcode ID: 99ddbcf60b655ea166cf42eb49b2130b840e6d7e807c2b2bff18edd503dfc50c
                            • Instruction ID: faf25cf3cabd8be68927418a64425281c2aebbcec1fe28026f03b533318f4679
                            • Opcode Fuzzy Hash: 99ddbcf60b655ea166cf42eb49b2130b840e6d7e807c2b2bff18edd503dfc50c
                            • Instruction Fuzzy Hash: E4016171D00A1DDBCF00DFE4E8489EDBB7AFB4A711F05425AE901F2140DB385564C7A5
                            APIs
                            • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?,?,0079799D), ref: 0079766F
                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?), ref: 0079768A
                            • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?), ref: 00797698
                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?), ref: 007976A8
                            • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0079758C,80070057,?,?), ref: 007976B4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: From$Prog$FreeStringTasklstrcmpi
                            • String ID:
                            • API String ID: 3897988419-0
                            • Opcode ID: 9abd73a3ff142f7eee76491eec26d37ca250c28ce303d612792ff6d634b5f6f9
                            • Instruction ID: 55ae363a566acbcdcc43f16f01f760b29cde7e24a612be51d4f56d5861d25909
                            • Opcode Fuzzy Hash: 9abd73a3ff142f7eee76491eec26d37ca250c28ce303d612792ff6d634b5f6f9
                            • Instruction Fuzzy Hash: 8E017172615604BBDB145F58EC44EAA7BFDEB44761F144028FD04D2211E739DD41D7A0
                            APIs
                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00798608
                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00798612
                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00798621
                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00798628
                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0079863E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: HeapInformationToken$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 44706859-0
                            • Opcode ID: 860a330df1206adf214e462e5e6c6925eb4d8d47667390714a5ee3b051756abb
                            • Instruction ID: f50527ea0440313d997fb5ce4a24270cc7a996cf55b20c8cbdc10f0f9db8ae14
                            • Opcode Fuzzy Hash: 860a330df1206adf214e462e5e6c6925eb4d8d47667390714a5ee3b051756abb
                            • Instruction Fuzzy Hash: 6EF06231201204BFEB101FB5EC8DE6B3FADFF8A754B044429F945C6151CB799C41DA65
                            APIs
                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00798669
                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00798673
                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00798682
                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00798689
                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0079869F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: HeapInformationToken$AllocErrorLastProcess
                            • String ID:
                            • API String ID: 44706859-0
                            • Opcode ID: 424d3d36fd13b25fa618d3e93855367880e5fc2885762cd348a26c34985aa8eb
                            • Instruction ID: 791d1e941ab319e186ace803e77437a015cfef5807582cb1881f6cf78c7dd903
                            • Opcode Fuzzy Hash: 424d3d36fd13b25fa618d3e93855367880e5fc2885762cd348a26c34985aa8eb
                            • Instruction Fuzzy Hash: 88F04971200204AFEB211FA5EC88E6B3FBDFF8AB54B14402AF949CA151CB699D41DA65
                            APIs
                            • GetDlgItem.USER32(?,000003E9), ref: 0079C6BA
                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 0079C6D1
                            • MessageBeep.USER32(00000000), ref: 0079C6E9
                            • KillTimer.USER32(?,0000040A), ref: 0079C705
                            • EndDialog.USER32(?,00000001), ref: 0079C71F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                            • String ID:
                            • API String ID: 3741023627-0
                            • Opcode ID: 8e7c123720b86a778fa976de29f5f20e54a56730ab74af71e0e4308e14175af1
                            • Instruction ID: 18774761bed63b3abf6c59abc0fbd60b8ac6dc58201e4bcacc57818bb0f31c28
                            • Opcode Fuzzy Hash: 8e7c123720b86a778fa976de29f5f20e54a56730ab74af71e0e4308e14175af1
                            • Instruction Fuzzy Hash: 9C016D30500704ABEF229B60ED8EFA677B9FF00705F00466DF582A14E1DBF8A9588F84
                            APIs
                            • EndPath.GDI32(?), ref: 007413BF
                            • StrokeAndFillPath.GDI32(?,?,0077BAD8,00000000,?), ref: 007413DB
                            • SelectObject.GDI32(?,00000000), ref: 007413EE
                            • DeleteObject.GDI32 ref: 00741401
                            • StrokePath.GDI32(?), ref: 0074141C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Path$ObjectStroke$DeleteFillSelect
                            • String ID:
                            • API String ID: 2625713937-0
                            • Opcode ID: 30f0b98161bf9a51bdb7a0a74247530a72ee4209503bf62ee3d5b0a1d7973eb6
                            • Instruction ID: b44d871afd54a1a415244a2a61fed056fcbf4367e45fe91d74e04dd790d89bb5
                            • Opcode Fuzzy Hash: 30f0b98161bf9a51bdb7a0a74247530a72ee4209503bf62ee3d5b0a1d7973eb6
                            • Instruction Fuzzy Hash: C2F0B230004348ABDB516F6AEC0CB583BA5BB01726F54C239F469850B1E73989F5DF55
                            APIs
                              • Part of subcall function 00760FF6: std::exception::exception.LIBCMT ref: 0076102C
                              • Part of subcall function 00760FF6: __CxxThrowException@8.LIBCMT ref: 00761041
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                              • Part of subcall function 00747BB1: _memmove.LIBCMT ref: 00747C0B
                            • __swprintf.LIBCMT ref: 0075302D
                            Strings
                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00752EC6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                            • API String ID: 1943609520-557222456
                            • Opcode ID: 563f807135fe7efe37bbfaf9ac53d1566a045be2b8ba89ad5780d43110bb6c59
                            • Instruction ID: d14108c078fa36c3c3ea444beca488be01e8d0edec67541105eb4b7766233e4a
                            • Opcode Fuzzy Hash: 563f807135fe7efe37bbfaf9ac53d1566a045be2b8ba89ad5780d43110bb6c59
                            • Instruction Fuzzy Hash: 49917E71108301EFC718EF24D899CAFB7A5EF85750F04491DF9869B2A1DB68EE48CB52
                            APIs
                            • OleSetContainedObject.OLE32(?,00000001), ref: 0079B981
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ContainedObject
                            • String ID: AutoIt3GUI$Container$%}
                            • API String ID: 3565006973-3704997335
                            • Opcode ID: 92965a502335882c25ea7abbebc45a2ac7ae8d6184b0db8a34772add216265ac
                            • Instruction ID: 41ebdd6687025ea6b2a6c5dafb67c96cef2eb79f0785c4ed2e8e566a6d2b494e
                            • Opcode Fuzzy Hash: 92965a502335882c25ea7abbebc45a2ac7ae8d6184b0db8a34772add216265ac
                            • Instruction Fuzzy Hash: 32914970600601DFDB24DF68E984B6ABBE9FF48710F14856EF94ACB291DB74E841CB60
                            APIs
                            • __startOneArgErrorHandling.LIBCMT ref: 007652DD
                              • Part of subcall function 00770340: __87except.LIBCMT ref: 0077037B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorHandling__87except__start
                            • String ID: pow
                            • API String ID: 2905807303-2276729525
                            • Opcode ID: 2c5d2fd7a4407a987118f41a0c0be6ade83cff2f92041bf28c5d00ece650de40
                            • Instruction ID: b8fd2b333654df29e3644abbd35b0a0810e1b92ea57461dcfcf5aeaab880be4b
                            • Opcode Fuzzy Hash: 2c5d2fd7a4407a987118f41a0c0be6ade83cff2f92041bf28c5d00ece650de40
                            • Instruction Fuzzy Hash: 4B517B61A1D601CBCF157724C95137E2B94AB017D4F20C959E8CE862E6EF7C8CD4EACA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID: #$+
                            • API String ID: 0-2552117581
                            • Opcode ID: 635a1734f03b62cb93540fbc4e057ba573b3548b5cf2f52d3b5fe577d39f3689
                            • Instruction ID: 216b0e4c742bd0679921916ec2fb52f46659220f21795d0e6de77c7770d634f0
                            • Opcode Fuzzy Hash: 635a1734f03b62cb93540fbc4e057ba573b3548b5cf2f52d3b5fe577d39f3689
                            • Instruction Fuzzy Hash: E8513375204666DFDF16DF28D8C8AFA7BA4EF19310F144059EC929B2A0D73C9C46CBA0
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memmove$_free
                            • String ID: Oau
                            • API String ID: 2620147621-3624848570
                            • Opcode ID: 3c6c80e47d42309889dc33bdec287b53a671076800a1bd51e509298d7ffea93b
                            • Instruction ID: 7ec38b22f495be9472dc5332e11390965afbc06cea0b5c402b2fe897afd9c5e6
                            • Opcode Fuzzy Hash: 3c6c80e47d42309889dc33bdec287b53a671076800a1bd51e509298d7ffea93b
                            • Instruction Fuzzy Hash: EF517B716083419FDB24CF28C440A6BBBE1FF85354F54492DE98A87361EB79D905CB82
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memset$_memmove
                            • String ID: ERCP
                            • API String ID: 2532777613-1384759551
                            • Opcode ID: 507ae22a5e5cca032574becbd078e424fb08f6ad46b5f4d8ee911edbfb7d48b6
                            • Instruction ID: 510f37b9be717361fc15e4136e893b47fffb954a0b842305642f5219383b9aea
                            • Opcode Fuzzy Hash: 507ae22a5e5cca032574becbd078e424fb08f6ad46b5f4d8ee911edbfb7d48b6
                            • Instruction Fuzzy Hash: B751C671900749DFDB24CF55C8857EABBF4EF04315F50856EEA4AC7240E7799698CB40
                            APIs
                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 007C76D0
                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 007C76E4
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 007C7708
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Window
                            • String ID: SysMonthCal32
                            • API String ID: 2326795674-1439706946
                            • Opcode ID: ff23f6bc59ef6a3b566bb972dce3b11ba4175e5ac5e7f2dcbb88a75cd341545d
                            • Instruction ID: e8dd879228fe6cb8c8d765b3c63c62a044b0531440ec6cbfa7d4183b08a922f3
                            • Opcode Fuzzy Hash: ff23f6bc59ef6a3b566bb972dce3b11ba4175e5ac5e7f2dcbb88a75cd341545d
                            • Instruction Fuzzy Hash: D2219F32600219ABDF159E64CC46FEA3B69EB48714F110218FE157B1D0DAB9A850DBA0
                            APIs
                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 007C6FAA
                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 007C6FBA
                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 007C6FDF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$MoveWindow
                            • String ID: Listbox
                            • API String ID: 3315199576-2633736733
                            • Opcode ID: 939d40a10e044723ef9eebeaf92ef94f093ee9caece06fc5a8a2183f34cd0fa0
                            • Instruction ID: f0090b3140f1b48f3345395d8166a75e0c52175ab2eaf69d0094283276ef820b
                            • Opcode Fuzzy Hash: 939d40a10e044723ef9eebeaf92ef94f093ee9caece06fc5a8a2183f34cd0fa0
                            • Instruction Fuzzy Hash: 54219F32610118BFDF119F54DC85FBB3BAAEF89764F01812CFA549B190CA79AC518BA0
                            APIs
                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 007C79E1
                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 007C79F6
                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 007C7A03
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: msctls_trackbar32
                            • API String ID: 3850602802-1010561917
                            • Opcode ID: 7ecb6e80b527c4bedd80a7f3c43268278c04a9d8154258f6d9cf4efa733165c2
                            • Instruction ID: 91a44f43a87c23cc906122117338ce813e8b1b675abaf0045dafc7461fab3725
                            • Opcode Fuzzy Hash: 7ecb6e80b527c4bedd80a7f3c43268278c04a9d8154258f6d9cf4efa733165c2
                            • Instruction Fuzzy Hash: E011E372244208BBEF189F75CC05FEB77A9EF89B64F01451DFA41A6090D675A851CB60
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00744C2E), ref: 00744CA3
                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00744CB5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: GetNativeSystemInfo$kernel32.dll
                            • API String ID: 2574300362-192647395
                            • Opcode ID: 70040f60b4dc9a7c4bde9ff266ce44910019255dd7acdbeec4f6421fd6c36c24
                            • Instruction ID: 4996385eebc989d7d1d78729295fdf70bdb3a99d51acb9635df3823c211c2434
                            • Opcode Fuzzy Hash: 70040f60b4dc9a7c4bde9ff266ce44910019255dd7acdbeec4f6421fd6c36c24
                            • Instruction Fuzzy Hash: A4D017B0511727CFE7209F31EA58F16B7E7AF05791B19C83ED886DA150E778D880CA60
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00744D2E,?,00744F4F,?,008062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00744D6F
                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00744D81
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                            • API String ID: 2574300362-3689287502
                            • Opcode ID: d2f60140603cade18c8778cc0de3367fbf9be473bb382fc0574effee55835dd9
                            • Instruction ID: 2f4c65c5d36f91ac087eaedf567ebff79be30a7f94a7636f1c59df61a15fb26d
                            • Opcode Fuzzy Hash: d2f60140603cade18c8778cc0de3367fbf9be473bb382fc0574effee55835dd9
                            • Instruction Fuzzy Hash: C8D017B0A10717CFD7209F31D808B16B7EAAF15352B15C83ED596D6250EB78D880CE54
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00744CE1,?), ref: 00744DA2
                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00744DB4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                            • API String ID: 2574300362-1355242751
                            • Opcode ID: d8bae74ba40cb2cda468f45feeb53efa1afd68fc7b453eafe78599fedd55441a
                            • Instruction ID: 626778c388b10a37277df8e8c2a13d52d9568afa2ea37447a4aad7e965827f99
                            • Opcode Fuzzy Hash: d8bae74ba40cb2cda468f45feeb53efa1afd68fc7b453eafe78599fedd55441a
                            • Instruction Fuzzy Hash: BFD0C7B0A00713DFC7208F30C808B56B3E6AF04340B04C83ED8C2C2250EB78C880CA10
                            APIs
                            • LoadLibraryA.KERNEL32(advapi32.dll,?,007C12C1), ref: 007C1080
                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 007C1092
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: RegDeleteKeyExW$advapi32.dll
                            • API String ID: 2574300362-4033151799
                            • Opcode ID: e5689d799ae55db5c772b29b18b2b923f88dc386b7bd6e27a495ba7f06411ce1
                            • Instruction ID: fe321caba99a13c8bca0762d2c5223b56ca4eaceaa5df9af03cdba0241d11aa8
                            • Opcode Fuzzy Hash: e5689d799ae55db5c772b29b18b2b923f88dc386b7bd6e27a495ba7f06411ce1
                            • Instruction Fuzzy Hash: BCD01770520716CFD7209F35D818E2A77E5AF06361F19CC3EE48ADA250E778C8C0CA50
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll,00000001,007B9009,?,007CF910), ref: 007B9403
                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 007B9415
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: GetModuleHandleExW$kernel32.dll
                            • API String ID: 2574300362-199464113
                            • Opcode ID: 5359215b716006e789c20fc73db7b616e1b3666b8e60cde9b3f5860f762d20ce
                            • Instruction ID: beec7bfb8affb872f82c61935cc3b2b7baaf12bf0bfc15d6cf64d590c2a93e85
                            • Opcode Fuzzy Hash: 5359215b716006e789c20fc73db7b616e1b3666b8e60cde9b3f5860f762d20ce
                            • Instruction Fuzzy Hash: 52D0C7B050072BCFCB208F30CA08A43BBE6AF00341B24C83EE696C2650E778C880CA20
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: LocalTime__swprintf
                            • String ID: %.3d$WIN_XPe
                            • API String ID: 2070861257-2409531811
                            • Opcode ID: 67245ae0f87aadc3d8880929b89440c6a10b0030b14bde8068e5b5fa4911bf62
                            • Instruction ID: 124924daae4f1e5651bfcbe63e784703d60acaa3a39b0db425e0b8bd0bf01a35
                            • Opcode Fuzzy Hash: 67245ae0f87aadc3d8880929b89440c6a10b0030b14bde8068e5b5fa4911bf62
                            • Instruction Fuzzy Hash: F4D012F1844118EACB45AA908C44CF97B7CB704301F9005D2F90692000F33C9B86DB25
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3ac7fbf7540da9cc0a1bf6879caa3b04102716983e7f6bbe551019a9f88f573f
                            • Instruction ID: 0676dfc078d91c97339957048420849136d45924e113ee58cca9eb0a7624b4c0
                            • Opcode Fuzzy Hash: 3ac7fbf7540da9cc0a1bf6879caa3b04102716983e7f6bbe551019a9f88f573f
                            • Instruction Fuzzy Hash: 82C17D74A14216EFCF18CFA8D884EAEB7B5FF48714B118598E805EB251D734EE81DB90
                            APIs
                            • CharLowerBuffW.USER32(?,?), ref: 007BE3D2
                            • CharLowerBuffW.USER32(?,?), ref: 007BE415
                              • Part of subcall function 007BDAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 007BDAD9
                            • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 007BE615
                            • _memmove.LIBCMT ref: 007BE628
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: BuffCharLower$AllocVirtual_memmove
                            • String ID:
                            • API String ID: 3659485706-0
                            • Opcode ID: 724be5e9ddf6b90e0ebff6295aba730a288e66bf6064781b5cc0206e6d7a51f2
                            • Instruction ID: 43a8499c57541343d1cd2e79a46bd2c9f4daf03074f50010545482882345b3cf
                            • Opcode Fuzzy Hash: 724be5e9ddf6b90e0ebff6295aba730a288e66bf6064781b5cc0206e6d7a51f2
                            • Instruction Fuzzy Hash: 5BC15A71608301DFC714DF28C484AAABBE4FF89318F14896DF89A9B351D739E945CB82
                            APIs
                            • CoInitialize.OLE32(00000000), ref: 007B83D8
                            • CoUninitialize.OLE32 ref: 007B83E3
                              • Part of subcall function 0079DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0079DAC5
                            • VariantInit.OLEAUT32(?), ref: 007B83EE
                            • VariantClear.OLEAUT32(?), ref: 007B86BF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                            • String ID:
                            • API String ID: 780911581-0
                            • Opcode ID: a7784fff24cfcc103aa4def11ded9eef2ac66522a5fd879d50c0119699329baa
                            • Instruction ID: 180cf97192cebc67cb08651267987d26e807fe6d8bf29bdb1cad9ec960f77366
                            • Opcode Fuzzy Hash: a7784fff24cfcc103aa4def11ded9eef2ac66522a5fd879d50c0119699329baa
                            • Instruction Fuzzy Hash: 22A11775204701DFCB50DF24C889B5AB7E9BF89314F148449FA9A9B3A2CB38ED04CB56
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Variant$AllocClearCopyInitString
                            • String ID:
                            • API String ID: 2808897238-0
                            • Opcode ID: 0d16148c20d7561939765586e7e7d51d1980fc792303a814d3b1e6e256de3a73
                            • Instruction ID: 1ec985bd3566e0afe4e0fa437ffaa3fbe783625fdbfd76c8eecdada399718c70
                            • Opcode Fuzzy Hash: 0d16148c20d7561939765586e7e7d51d1980fc792303a814d3b1e6e256de3a73
                            • Instruction Fuzzy Hash: 5551B870614301DADF28AF69F895A7AB3E5AF48310F24881FF556CB291EB7C9840DB15
                            APIs
                            • GetWindowRect.USER32(012BEA10,?), ref: 007C9AD2
                            • ScreenToClient.USER32(00000002,00000002), ref: 007C9B05
                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 007C9B72
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$ClientMoveRectScreen
                            • String ID:
                            • API String ID: 3880355969-0
                            • Opcode ID: fd0f05cfaf8a5909ef1806ac14a5969485805dd0530763119ec1e314a0dd144f
                            • Instruction ID: 27e20a84c5cdbde60fe8300d68f0a6f94c5ca3fc151ebd1653d65dfbbacfed56
                            • Opcode Fuzzy Hash: fd0f05cfaf8a5909ef1806ac14a5969485805dd0530763119ec1e314a0dd144f
                            • Instruction Fuzzy Hash: 9D512C75A00209EFCF54DF68D885EAE7BB6FB44320F14826DF9159B290D734AD91CB90
                            APIs
                            • socket.WSOCK32(00000002,00000002,00000011), ref: 007B6CE4
                            • WSAGetLastError.WSOCK32(00000000), ref: 007B6CF4
                              • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                              • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 007B6D58
                            • WSAGetLastError.WSOCK32(00000000), ref: 007B6D64
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ErrorLast$__itow__swprintfsocket
                            • String ID:
                            • API String ID: 2214342067-0
                            • Opcode ID: 5ae3e4e3c2ee8b4a3fac4982931aca8101bbb585ec9d586b0b7e9835481cd5ab
                            • Instruction ID: de717408f3c0321d70261cf6f974bde7dd4272a097acb06b489aa635bd33f4d2
                            • Opcode Fuzzy Hash: 5ae3e4e3c2ee8b4a3fac4982931aca8101bbb585ec9d586b0b7e9835481cd5ab
                            • Instruction Fuzzy Hash: 69418174740214AFEB10AF24DC8AF7A77E5DB44B10F44C018FA599F2D2DB799D008791
                            APIs
                            • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,007CF910), ref: 007B67BA
                            • _strlen.LIBCMT ref: 007B67EC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _strlen
                            • String ID:
                            • API String ID: 4218353326-0
                            • Opcode ID: 06dd544b67e927ce1ea79cf20d9286203efe766b19ed9c23bb6785c00fca867c
                            • Instruction ID: 6f84e75a3600b34b5ba9aa52235fe66aa6ff01601fe0552fb9957afcccc71844
                            • Opcode Fuzzy Hash: 06dd544b67e927ce1ea79cf20d9286203efe766b19ed9c23bb6785c00fca867c
                            • Instruction Fuzzy Hash: DE417371A00104EBCB14EB64DCD9FEEB7A9EF44314F148169F91697292DB3CAD04CB51
                            APIs
                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 007ABB09
                            • GetLastError.KERNEL32(?,00000000), ref: 007ABB2F
                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 007ABB54
                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 007ABB80
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CreateHardLink$DeleteErrorFileLast
                            • String ID:
                            • API String ID: 3321077145-0
                            • Opcode ID: bde92f1a995597a309addf5f384cc3381ea8125c95e44c4ed156cad2234e0617
                            • Instruction ID: dea44eede118e632b0ebba4f1151a5ec9b9edf45f8fa1b07ef49f36a81f7bbd9
                            • Opcode Fuzzy Hash: bde92f1a995597a309addf5f384cc3381ea8125c95e44c4ed156cad2234e0617
                            • Instruction Fuzzy Hash: 4B410839200610DFCB11EF15C589A5EBBE5EF8A310B19C498F94A9B762CB39FD01CB91
                            APIs
                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007C8B4D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: InvalidateRect
                            • String ID:
                            • API String ID: 634782764-0
                            • Opcode ID: 57c0f458dfb378e4d6ccc277322050a7109186254c1926058ac28ddd4d47749d
                            • Instruction ID: 064b6a8e7b7ed74d2a83848141470e2e2129b371ec4de6f32f31c72d5131101a
                            • Opcode Fuzzy Hash: 57c0f458dfb378e4d6ccc277322050a7109186254c1926058ac28ddd4d47749d
                            • Instruction Fuzzy Hash: 4A3192F4600208BEEFA09F18CC45FA977A5FB05310F64861EFA51D72A1DF38AD609752
                            APIs
                            • ClientToScreen.USER32(?,?), ref: 007CAE1A
                            • GetWindowRect.USER32(?,?), ref: 007CAE90
                            • PtInRect.USER32(?,?,007CC304), ref: 007CAEA0
                            • MessageBeep.USER32(00000000), ref: 007CAF11
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Rect$BeepClientMessageScreenWindow
                            • String ID:
                            • API String ID: 1352109105-0
                            • Opcode ID: dda71af567bcc0fffc9fa9bb2dfed7b9bfc88172f56b68d5e8a486bfbd8ccfa2
                            • Instruction ID: 681faf3f97d6a49c17097dcaac1cba3f7d94e1cc7567c668d35a167a4abedbf2
                            • Opcode Fuzzy Hash: dda71af567bcc0fffc9fa9bb2dfed7b9bfc88172f56b68d5e8a486bfbd8ccfa2
                            • Instruction Fuzzy Hash: 5E418870A0021DEFCB11CF58C885FA9BBF5FB4831AF1881ADE9149B251D734E951DB92
                            APIs
                            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 007A1037
                            • SetKeyboardState.USER32(00000080,?,00000001), ref: 007A1053
                            • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 007A10B9
                            • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 007A110B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: KeyboardState$InputMessagePostSend
                            • String ID:
                            • API String ID: 432972143-0
                            • Opcode ID: 5aebcbe4e71039e710d8fdbc94152c4d2b7df0b222423188a534415f60ecbbb2
                            • Instruction ID: 9a2fa4bacc625aec9e639b317d9b27feb7ad831f2f6c5f23f0021b599eac9034
                            • Opcode Fuzzy Hash: 5aebcbe4e71039e710d8fdbc94152c4d2b7df0b222423188a534415f60ecbbb2
                            • Instruction Fuzzy Hash: 43314B30E44698AEFB308B658C09BFBBBA9ABC7310F84431AE580521D1C37D8DD09765
                            APIs
                            • GetKeyboardState.USER32(?,76C1C0D0,?,00008000), ref: 007A1176
                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 007A1192
                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 007A11F1
                            • SendInput.USER32(00000001,?,0000001C,76C1C0D0,?,00008000), ref: 007A1243
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: KeyboardState$InputMessagePostSend
                            • String ID:
                            • API String ID: 432972143-0
                            • Opcode ID: f287b15f14dcff7cae0b19c79d652a5545a6325f374fcc173a4f3d0005e3348f
                            • Instruction ID: 599be86e2c8a387065de5cfefd964dc80f79178c017a6f805a7d5ca14404a14d
                            • Opcode Fuzzy Hash: f287b15f14dcff7cae0b19c79d652a5545a6325f374fcc173a4f3d0005e3348f
                            • Instruction Fuzzy Hash: 51310730A4061C9EFF208B65CC08BFA7BAAABCB310F84835BE681921D1C33C89559755
                            APIs
                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0077644B
                            • __isleadbyte_l.LIBCMT ref: 00776479
                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007764A7
                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007764DD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                            • String ID:
                            • API String ID: 3058430110-0
                            • Opcode ID: 053d1f1ebf17b2609d26402f51b03d66bae203295da81e7608253cf96509064b
                            • Instruction ID: 448650c9cea9f07ea6d3f50b3ddecb4510d2c23035d2934c3640a9b644b0daba
                            • Opcode Fuzzy Hash: 053d1f1ebf17b2609d26402f51b03d66bae203295da81e7608253cf96509064b
                            • Instruction Fuzzy Hash: EF310F30600A86EFDF218F75CC44BAA7BA5FF01390F198028E859871A4EB39DA50DB90
                            APIs
                            • GetForegroundWindow.USER32 ref: 007C5189
                              • Part of subcall function 007A387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007A3897
                              • Part of subcall function 007A387D: GetCurrentThreadId.KERNEL32 ref: 007A389E
                              • Part of subcall function 007A387D: AttachThreadInput.USER32(00000000,?,007A52A7), ref: 007A38A5
                            • GetCaretPos.USER32(?), ref: 007C519A
                            • ClientToScreen.USER32(00000000,?), ref: 007C51D5
                            • GetForegroundWindow.USER32 ref: 007C51DB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                            • String ID:
                            • API String ID: 2759813231-0
                            • Opcode ID: f03dd68f6b6f3ba1a99106006802de582e94726120aba08673c4085d8b2e613d
                            • Instruction ID: f916372c3e42ac5e26290a3bd6e012d219a4aef073d3ba57f4945dbf5f9b99bb
                            • Opcode Fuzzy Hash: f03dd68f6b6f3ba1a99106006802de582e94726120aba08673c4085d8b2e613d
                            • Instruction Fuzzy Hash: 8331F071900108AFDB04EFA5C849EEFB7F9EF98300F10806AE515E7251EB799E45CBA0
                            APIs
                              • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                            • GetCursorPos.USER32(?), ref: 007CC7C2
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0077BBFB,?,?,?,?,?), ref: 007CC7D7
                            • GetCursorPos.USER32(?), ref: 007CC824
                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0077BBFB,?,?,?), ref: 007CC85E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                            • String ID:
                            • API String ID: 2864067406-0
                            • Opcode ID: 5dfeb6d511cfe96b213ea931267b136135adc23226bfc5cf8af9d16994310498
                            • Instruction ID: 98e90e9a1efc61bd0a8da79900e9670005a813e275cb16894e3d1eb98ac0fb2a
                            • Opcode Fuzzy Hash: 5dfeb6d511cfe96b213ea931267b136135adc23226bfc5cf8af9d16994310498
                            • Instruction Fuzzy Hash: AA317E35600018AFCB16CF58D898EEB7BFAFB49310F04816DF9098B261D7399D61DBA0
                            APIs
                            • __setmode.LIBCMT ref: 00760BF2
                              • Part of subcall function 00745B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,007A7B20,?,?,00000000), ref: 00745B8C
                              • Part of subcall function 00745B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,007A7B20,?,?,00000000,?,?), ref: 00745BB0
                            • _fprintf.LIBCMT ref: 00760C29
                            • OutputDebugStringW.KERNEL32(?), ref: 00796331
                              • Part of subcall function 00764CDA: _flsall.LIBCMT ref: 00764CF3
                            • __setmode.LIBCMT ref: 00760C5E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                            • String ID:
                            • API String ID: 521402451-0
                            • Opcode ID: 2c17b288cff33d250fbcfb4b91d0bd52e3593ac8805aa85e09f7415bea067be5
                            • Instruction ID: 0ea971a7a87451b0854ade0394634c604bc3e996e825a9a7248318b05bdeb86b
                            • Opcode Fuzzy Hash: 2c17b288cff33d250fbcfb4b91d0bd52e3593ac8805aa85e09f7415bea067be5
                            • Instruction Fuzzy Hash: 39112432A04204FFCB05B7B4AC4A9BE7B69DF81320F14421AF60657292EF2C2D5597A5
                            APIs
                              • Part of subcall function 00798652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00798669
                              • Part of subcall function 00798652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00798673
                              • Part of subcall function 00798652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00798682
                              • Part of subcall function 00798652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00798689
                              • Part of subcall function 00798652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0079869F
                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00798BEB
                            • _memcmp.LIBCMT ref: 00798C0E
                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00798C44
                            • HeapFree.KERNEL32(00000000), ref: 00798C4B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                            • String ID:
                            • API String ID: 1592001646-0
                            • Opcode ID: 25db18495ef8a3b1f742cf2ceefd79ab587ff289ef8983f322b4500417c4a5b6
                            • Instruction ID: 18e2faa2a0215919d556f5ac9bea4ef976ee24994b9902c3b2d42c8790727404
                            • Opcode Fuzzy Hash: 25db18495ef8a3b1f742cf2ceefd79ab587ff289ef8983f322b4500417c4a5b6
                            • Instruction Fuzzy Hash: 0E21A171D01208EFCF00DF94D948BEEB7B8EF42340F084099E454A7241DB38AE05CB61
                            APIs
                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007B1A97
                              • Part of subcall function 007B1B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007B1B40
                              • Part of subcall function 007B1B21: InternetCloseHandle.WININET(00000000), ref: 007B1BDD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Internet$CloseConnectHandleOpen
                            • String ID:
                            • API String ID: 1463438336-0
                            • Opcode ID: 136814334b6ba9d54334adfb2a0cb4f7e314647f3d7e7c3b7be0677be75c664d
                            • Instruction ID: 82792e92d6b3896807e0be86c3bed831afdbfb104e76af5b89f2b9a15b60d3ed
                            • Opcode Fuzzy Hash: 136814334b6ba9d54334adfb2a0cb4f7e314647f3d7e7c3b7be0677be75c664d
                            • Instruction Fuzzy Hash: B821D171201600BFDB119F608C18FFBB7AEFF48700F90401AFA0196661EB39E8219BA4
                            APIs
                              • Part of subcall function 0079F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0079E1C4,?,?,?,0079EFB7,00000000,000000EF,00000119,?,?), ref: 0079F5BC
                              • Part of subcall function 0079F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 0079F5E2
                              • Part of subcall function 0079F5AD: lstrcmpiW.KERNEL32(00000000,?,0079E1C4,?,?,?,0079EFB7,00000000,000000EF,00000119,?,?), ref: 0079F613
                            • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0079EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0079E1DD
                            • lstrcpyW.KERNEL32(00000000,?), ref: 0079E203
                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,0079EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0079E237
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: lstrcmpilstrcpylstrlen
                            • String ID: cdecl
                            • API String ID: 4031866154-3896280584
                            • Opcode ID: 569d8a6b55cd2879968cdc8a7c07e3ad5e12e95b8a677656bb90df0bc2684b1b
                            • Instruction ID: 3daf5ae5318726750f9c52111e84d44463980de629f6eb55913fdee4792acf5f
                            • Opcode Fuzzy Hash: 569d8a6b55cd2879968cdc8a7c07e3ad5e12e95b8a677656bb90df0bc2684b1b
                            • Instruction Fuzzy Hash: C811AC36200245EFCF25AF64E849E7A77A9FF84310B44802AE806CB260EB79D85187A4
                            APIs
                            • _free.LIBCMT ref: 00775351
                              • Part of subcall function 0076594C: __FF_MSGBANNER.LIBCMT ref: 00765963
                              • Part of subcall function 0076594C: __NMSG_WRITE.LIBCMT ref: 0076596A
                              • Part of subcall function 0076594C: RtlAllocateHeap.NTDLL(012A0000,00000000,00000001,00000000,?,?,?,00761013,?), ref: 0076598F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: AllocateHeap_free
                            • String ID:
                            • API String ID: 614378929-0
                            • Opcode ID: 4f2f426649c9b06dab2e681618cd6aca8f7c7477aa23c99fcb5ed192f91cdcaf
                            • Instruction ID: 5e42b18469a07a81debafe31f7d94ce7ebf41b64585e1847b153d73e9528dd84
                            • Opcode Fuzzy Hash: 4f2f426649c9b06dab2e681618cd6aca8f7c7477aa23c99fcb5ed192f91cdcaf
                            • Instruction Fuzzy Hash: 07119432604A15EECF212F70AC496593B94AF153E4F10862AFD4A961B1DBFD89409661
                            APIs
                            • _memset.LIBCMT ref: 00744560
                              • Part of subcall function 0074410D: _memset.LIBCMT ref: 0074418D
                              • Part of subcall function 0074410D: _wcscpy.LIBCMT ref: 007441E1
                              • Part of subcall function 0074410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007441F1
                            • KillTimer.USER32(?,00000001,?,?), ref: 007445B5
                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007445C4
                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0077D6CE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                            • String ID:
                            • API String ID: 1378193009-0
                            • Opcode ID: f267a83dfa9f88815ec7c4271f9faafe5ba804f6233d74bf281089efeef3c994
                            • Instruction ID: 7df043445d0906c8004bf9fd05ab79b406b0b73c1b0b92bdb6d3a98b61a0e016
                            • Opcode Fuzzy Hash: f267a83dfa9f88815ec7c4271f9faafe5ba804f6233d74bf281089efeef3c994
                            • Instruction Fuzzy Hash: 4921C270904784AFEF328B249859BE7BBECAF01348F04409EE69E96281C77C5E949B51
                            APIs
                            • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 007A40D1
                            • _memset.LIBCMT ref: 007A40F2
                            • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 007A4144
                            • CloseHandle.KERNEL32(00000000), ref: 007A414D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseControlCreateDeviceFileHandle_memset
                            • String ID:
                            • API String ID: 1157408455-0
                            • Opcode ID: f499394b5cddf7acc9c154a58843676d7be129c5a99e6896843a6154b2675ac8
                            • Instruction ID: 39c27562ab47db2eebd46248b6d7757ad50ec2f3c8b8f574687a64adf9f1219a
                            • Opcode Fuzzy Hash: f499394b5cddf7acc9c154a58843676d7be129c5a99e6896843a6154b2675ac8
                            • Instruction Fuzzy Hash: 9311CD7590122CBAD7305BA59C4DFABBB7CEF85760F1042DAF908D7180D6744E84CBA4
                            APIs
                              • Part of subcall function 00745B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,007A7B20,?,?,00000000), ref: 00745B8C
                              • Part of subcall function 00745B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,007A7B20,?,?,00000000,?,?), ref: 00745BB0
                            • gethostbyname.WSOCK32(?,?,?), ref: 007B66AC
                            • WSAGetLastError.WSOCK32(00000000), ref: 007B66B7
                            • _memmove.LIBCMT ref: 007B66E4
                            • inet_ntoa.WSOCK32(?), ref: 007B66EF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                            • String ID:
                            • API String ID: 1504782959-0
                            • Opcode ID: adf94f281a4731fe6de65218ec650c5a30b4f6252c391fe0b838e2dbcde9ff99
                            • Instruction ID: ad248c78cf9b84b9a42a4978ae4085ed26107bb303971c39b84bffca28c25b01
                            • Opcode Fuzzy Hash: adf94f281a4731fe6de65218ec650c5a30b4f6252c391fe0b838e2dbcde9ff99
                            • Instruction Fuzzy Hash: 44116075500509EFCF00EBA4DD8ADEEB7B9EF44310B148169F602A7262DF38AE04CB61
                            APIs
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00799043
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00799055
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0079906B
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00799086
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: e3722dbe89a1302faa954764fa9e3fc6126f9d4cd1af7e18371f17f0cad8b5dd
                            • Instruction ID: b39901bfb8d28c8efbc25143fd1186a1a38644925ececa353c76752a95c9c4af
                            • Opcode Fuzzy Hash: e3722dbe89a1302faa954764fa9e3fc6126f9d4cd1af7e18371f17f0cad8b5dd
                            • Instruction Fuzzy Hash: 43114C79901219FFEF10DFA9CD84EADBB74FB48310F204095EA14B7250D6726E10DB94
                            APIs
                              • Part of subcall function 00742612: GetWindowLongW.USER32(?,000000EB), ref: 00742623
                            • DefDlgProcW.USER32(?,00000020,?), ref: 007412D8
                            • GetClientRect.USER32(?,?), ref: 0077B84B
                            • GetCursorPos.USER32(?), ref: 0077B855
                            • ScreenToClient.USER32(?,?), ref: 0077B860
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Client$CursorLongProcRectScreenWindow
                            • String ID:
                            • API String ID: 4127811313-0
                            • Opcode ID: b431a5a1d272982e91794927272e8188b988dbe40d44c1b6be276427b64aa9ff
                            • Instruction ID: c77063db669665edc4901cc3214cb83a643e95975e715fad8770b132bbe16868
                            • Opcode Fuzzy Hash: b431a5a1d272982e91794927272e8188b988dbe40d44c1b6be276427b64aa9ff
                            • Instruction Fuzzy Hash: 0B112835A00119EFCB00EF94D889DFE77B9FB05301F40445AFA11E7151D778AAA1CBA9
                            APIs
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,007A01FD,?,007A1250,?,00008000), ref: 007A166F
                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,007A01FD,?,007A1250,?,00008000), ref: 007A1694
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,007A01FD,?,007A1250,?,00008000), ref: 007A169E
                            • Sleep.KERNEL32(?,?,?,?,?,?,?,007A01FD,?,007A1250,?,00008000), ref: 007A16D1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CounterPerformanceQuerySleep
                            • String ID:
                            • API String ID: 2875609808-0
                            • Opcode ID: 62f04605c4595e56679eb5c187fea0be70a44ca90a790f3e2a0c902f6b442962
                            • Instruction ID: 474f8f49fd513a95e15ff8858d87ab01ca6f48eecd8c33015d5dd231f6668cff
                            • Opcode Fuzzy Hash: 62f04605c4595e56679eb5c187fea0be70a44ca90a790f3e2a0c902f6b442962
                            • Instruction Fuzzy Hash: F2117C31C0191CDBDF009FA5D848AEEBB78FF4A711F49819AE940F2240CF3895608BDA
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                            • String ID:
                            • API String ID: 3016257755-0
                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                            • Instruction ID: 98cb650a2b01869feabb8e380e114efbd1f55ca825365066dcf8ba4276fa3273
                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                            • Instruction Fuzzy Hash: F701403614414AFBCF1A5E84CC458EE3F72BF59391B588525FA2C98032D63BC9B1EB81
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 007CB59E
                            • ScreenToClient.USER32(?,?), ref: 007CB5B6
                            • ScreenToClient.USER32(?,?), ref: 007CB5DA
                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 007CB5F5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClientRectScreen$InvalidateWindow
                            • String ID:
                            • API String ID: 357397906-0
                            • Opcode ID: d102a054c36addc374f7ff2c95d61e1d36de5dd4ea6b762e8d30d876eaf7f502
                            • Instruction ID: 1c75c841e6cf48826f286e13128986b6a699e24853afe4280d608b1c485ae63b
                            • Opcode Fuzzy Hash: d102a054c36addc374f7ff2c95d61e1d36de5dd4ea6b762e8d30d876eaf7f502
                            • Instruction Fuzzy Hash: 321146B5D00209EFDB41CF99D444AEEFBB5FB08310F10816AE954E3220D735AA658F54
                            APIs
                            • _memset.LIBCMT ref: 007CB8FE
                            • _memset.LIBCMT ref: 007CB90D
                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00807F20,00807F64), ref: 007CB93C
                            • CloseHandle.KERNEL32 ref: 007CB94E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memset$CloseCreateHandleProcess
                            • String ID:
                            • API String ID: 3277943733-0
                            • Opcode ID: 74e675c67c67d885790674d6ad6795c24be7077965792346ba0829475b59eef1
                            • Instruction ID: 2fad0ccc65ea16fef66cf250ce04a9a8ce2e6b48d046948b6565d10b41ce5c80
                            • Opcode Fuzzy Hash: 74e675c67c67d885790674d6ad6795c24be7077965792346ba0829475b59eef1
                            • Instruction Fuzzy Hash: 08F05EB2948341BBE2502761AC0AFBB3B5DFB08354F004025FB08E61A2DF79690487A8
                            APIs
                            • EnterCriticalSection.KERNEL32(?), ref: 007A6E88
                              • Part of subcall function 007A794E: _memset.LIBCMT ref: 007A7983
                            • _memmove.LIBCMT ref: 007A6EAB
                            • _memset.LIBCMT ref: 007A6EB8
                            • LeaveCriticalSection.KERNEL32(?), ref: 007A6EC8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CriticalSection_memset$EnterLeave_memmove
                            • String ID:
                            • API String ID: 48991266-0
                            • Opcode ID: aaf7627902f3265ea59f92ff649e95dc2fac21bab9daac6dce4b56294d3b8925
                            • Instruction ID: b7c3ecfa44d4ec5384754d6cc381090e61b38fdf2630ccf7526f1e58e4a883a3
                            • Opcode Fuzzy Hash: aaf7627902f3265ea59f92ff649e95dc2fac21bab9daac6dce4b56294d3b8925
                            • Instruction Fuzzy Hash: 65F0543A104200EBCF416F55DC89E4ABB2AEF45320B04C065FE095E226C735A911CBB5
                            APIs
                              • Part of subcall function 007412F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0074134D
                              • Part of subcall function 007412F3: SelectObject.GDI32(?,00000000), ref: 0074135C
                              • Part of subcall function 007412F3: BeginPath.GDI32(?), ref: 00741373
                              • Part of subcall function 007412F3: SelectObject.GDI32(?,00000000), ref: 0074139C
                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 007CC030
                            • LineTo.GDI32(00000000,?,?), ref: 007CC03D
                            • EndPath.GDI32(00000000), ref: 007CC04D
                            • StrokePath.GDI32(00000000), ref: 007CC05B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                            • String ID:
                            • API String ID: 1539411459-0
                            • Opcode ID: 37aeb21c089969fdca95389306b63901c3155620bb97a69daa67283a36125605
                            • Instruction ID: db9237979d7c5d9f5dd0af28cb71ebf73e8b75c8ead8222316237adcde0ab908
                            • Opcode Fuzzy Hash: 37aeb21c089969fdca95389306b63901c3155620bb97a69daa67283a36125605
                            • Instruction Fuzzy Hash: E6F05E31101259FBDB126F54AC0AFCE3F5ABF05711F148018FA15610E287B955A1DB99
                            APIs
                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0079A399
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0079A3AC
                            • GetCurrentThreadId.KERNEL32 ref: 0079A3B3
                            • AttachThreadInput.USER32(00000000), ref: 0079A3BA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                            • String ID:
                            • API String ID: 2710830443-0
                            • Opcode ID: ed21ec9c400686654b7c8d6228ded7c3ff3f68ee4ec8bba2e3c6275c00253205
                            • Instruction ID: 9c2614a48a71e7752fb2d6b973f754b5cd82ddcb035724aff6ea95deae156d33
                            • Opcode Fuzzy Hash: ed21ec9c400686654b7c8d6228ded7c3ff3f68ee4ec8bba2e3c6275c00253205
                            • Instruction Fuzzy Hash: 89E03931142228BADB201BA2EC0CED73F2DEF167A1F008029F90894060C6798540CBE5
                            APIs
                            • GetSysColor.USER32(00000008), ref: 00742231
                            • SetTextColor.GDI32(?,000000FF), ref: 0074223B
                            • SetBkMode.GDI32(?,00000001), ref: 00742250
                            • GetStockObject.GDI32(00000005), ref: 00742258
                            • GetWindowDC.USER32(?,00000000), ref: 0077C0D3
                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0077C0E0
                            • GetPixel.GDI32(00000000,?,00000000), ref: 0077C0F9
                            • GetPixel.GDI32(00000000,00000000,?), ref: 0077C112
                            • GetPixel.GDI32(00000000,?,?), ref: 0077C132
                            • ReleaseDC.USER32(?,00000000), ref: 0077C13D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                            • String ID:
                            • API String ID: 1946975507-0
                            • Opcode ID: c7d5624d19990824bfa199254b4fe965f5834790fba69f9c566e470b24da9265
                            • Instruction ID: 38e4ee7ac2a5822900d64f1e102f22eeff128838af845a970621a7e425d450f7
                            • Opcode Fuzzy Hash: c7d5624d19990824bfa199254b4fe965f5834790fba69f9c566e470b24da9265
                            • Instruction Fuzzy Hash: 30E03932200648EFDF215F68FC09BD83B11AB05332F04C36AFA69880E187794990DB11
                            APIs
                            • GetCurrentThread.KERNEL32 ref: 00798C63
                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,0079882E), ref: 00798C6A
                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0079882E), ref: 00798C77
                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,0079882E), ref: 00798C7E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CurrentOpenProcessThreadToken
                            • String ID:
                            • API String ID: 3974789173-0
                            • Opcode ID: 3aec29adbe43c5176921c26f765fceb1ee9ccd0d4ec30f7da7d50246bac00c4a
                            • Instruction ID: 15990e1180760ff114643c5f4e8703a680d183b2922dfa07465d10c7aee78205
                            • Opcode Fuzzy Hash: 3aec29adbe43c5176921c26f765fceb1ee9ccd0d4ec30f7da7d50246bac00c4a
                            • Instruction Fuzzy Hash: 21E08676642211EBDB605FB06E0CF563BADFF52B92F04886CF645C9040DA3C8485CB75
                            APIs
                            • GetDesktopWindow.USER32 ref: 00782187
                            • GetDC.USER32(00000000), ref: 00782191
                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007821B1
                            • ReleaseDC.USER32(?), ref: 007821D2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: ed85c289937750f5177b46f7d94c7880a5c88a651b9bbe235d34a4c94f34c689
                            • Instruction ID: f563002d66813fb2c2ca4ae3b7811a77364d8e058555c3e641962d0e848c09d4
                            • Opcode Fuzzy Hash: ed85c289937750f5177b46f7d94c7880a5c88a651b9bbe235d34a4c94f34c689
                            • Instruction Fuzzy Hash: 52E0E5B5800204EFDB41AF60C808A9D7BB2EB4C351F10C429F95AA7260CB3C91429F45
                            APIs
                            • GetDesktopWindow.USER32 ref: 0078219B
                            • GetDC.USER32(00000000), ref: 007821A5
                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007821B1
                            • ReleaseDC.USER32(?), ref: 007821D2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: bae3948be7e5f9842c8309e8c501c369adb441c896f7488894b5c0f676af3612
                            • Instruction ID: b3f9088a407c9652a06f3b5b48a3e634876884a08233c1db840fa0259e9e7347
                            • Opcode Fuzzy Hash: bae3948be7e5f9842c8309e8c501c369adb441c896f7488894b5c0f676af3612
                            • Instruction Fuzzy Hash: 8DE0EEB5800204AFCB02AFA0C808A9EBBA2AB4C310F10C029F95AA7220CB3C91419F44
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID: %}
                            • API String ID: 0-578177530
                            • Opcode ID: b39c6ed878ddd57da94389336ab278627e16d7ccb28555d4678bf6b5dbe59793
                            • Instruction ID: 58b313f4371829cc0282a28cdeb8cc536c91f21f8f576456cf0b20fa73af0ac3
                            • Opcode Fuzzy Hash: b39c6ed878ddd57da94389336ab278627e16d7ccb28555d4678bf6b5dbe59793
                            • Instruction Fuzzy Hash: 6CB1C271900109DBCF14EF98C4859FEB7B9FF45310F50402AE902A7195EB3C9E95CB52
                            APIs
                              • Part of subcall function 0075FEC6: _wcscpy.LIBCMT ref: 0075FEE9
                              • Part of subcall function 00749997: __itow.LIBCMT ref: 007499C2
                              • Part of subcall function 00749997: __swprintf.LIBCMT ref: 00749A0C
                            • __wcsnicmp.LIBCMT ref: 007AB298
                            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 007AB361
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                            • String ID: LPT
                            • API String ID: 3222508074-1350329615
                            • Opcode ID: c15c481fecbca08232a3f4bbd30bf0c6deaa9da1d8dcc4019e6afb073ad1d383
                            • Instruction ID: 73cfa4bfe43c9a75ae0386ca872b01ee5a18d5d87e161c73f52607b2de021a5b
                            • Opcode Fuzzy Hash: c15c481fecbca08232a3f4bbd30bf0c6deaa9da1d8dcc4019e6afb073ad1d383
                            • Instruction Fuzzy Hash: B8618375A00215EFCF14DF94C885EAEB7B4EF89310F11415AF946AB392DB78AE40CB50
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: Oau
                            • API String ID: 4104443479-3624848570
                            • Opcode ID: 0cb0f0db11054e2ef1a25a6634b9cc9a7bbfb2228f2dd9c558145c0cf982c16f
                            • Instruction ID: 8d0b043b900c28658641e4f1f58e796542d9f0a48174bf39759b6d84d10e66d5
                            • Opcode Fuzzy Hash: 0cb0f0db11054e2ef1a25a6634b9cc9a7bbfb2228f2dd9c558145c0cf982c16f
                            • Instruction Fuzzy Hash: 6B5181B0900609DFCF64DF68C884AAEBBF1FF44314F54852AE85AD7240EB38AD95CB51
                            APIs
                            • Sleep.KERNEL32(00000000), ref: 00752AC8
                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 00752AE1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: GlobalMemorySleepStatus
                            • String ID: @
                            • API String ID: 2783356886-2766056989
                            • Opcode ID: 6c2b8de98cc6e09a47519edb783d0c2f832ffd212c87b7ae5bfbecec8bdd08a7
                            • Instruction ID: 4d3d196b5aed21c650c5b1fff227cc3ccd3bf0a8068bc88bf487e350f0ef27b3
                            • Opcode Fuzzy Hash: 6c2b8de98cc6e09a47519edb783d0c2f832ffd212c87b7ae5bfbecec8bdd08a7
                            • Instruction Fuzzy Hash: E9514771518745DBD320AF10DC8ABAFBBE8FF84310F42885DF2D9511A1DB388529CB66
                            APIs
                              • Part of subcall function 0074506B: __fread_nolock.LIBCMT ref: 00745089
                            • _wcscmp.LIBCMT ref: 007A9AAE
                            • _wcscmp.LIBCMT ref: 007A9AC1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _wcscmp$__fread_nolock
                            • String ID: FILE
                            • API String ID: 4029003684-3121273764
                            • Opcode ID: ff42affdcc5172339f54fb8d01c42819b31cb852b0a9ba8a7f475e9ad2a35a69
                            • Instruction ID: 302021744a228ca6f4d217ae94de94467c2755b52a8657456033133e4ea94255
                            • Opcode Fuzzy Hash: ff42affdcc5172339f54fb8d01c42819b31cb852b0a9ba8a7f475e9ad2a35a69
                            • Instruction Fuzzy Hash: CA41D6B1A00619FBDF209AA4DC49FEFB7B9DF86710F000179BA00A7191DB799A1487A1
                            APIs
                            • _memset.LIBCMT ref: 007B2892
                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 007B28C8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CrackInternet_memset
                            • String ID: |
                            • API String ID: 1413715105-2343686810
                            • Opcode ID: 216ad117c6b02ad04f8fb0801a591d77b0778c3e9631c64ff201508300ad26e2
                            • Instruction ID: 25524aa2210ee989a574185b19b75a5a7b06e8385aa3a023ea2361289559a874
                            • Opcode Fuzzy Hash: 216ad117c6b02ad04f8fb0801a591d77b0778c3e9631c64ff201508300ad26e2
                            • Instruction Fuzzy Hash: 29311971801119EFCF05AFA1CC89EEEBFB9FF08350F104029F815A6166EB355A56DBA0
                            APIs
                            • DestroyWindow.USER32(?,?,?,?), ref: 007C6D86
                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 007C6DC2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$DestroyMove
                            • String ID: static
                            • API String ID: 2139405536-2160076837
                            • Opcode ID: 67dc8e8edc9798fcdf82e7eccec93e3adf1a7f3fc28df559e5c87949effdb0f7
                            • Instruction ID: 7e14b4b0267c15fd40e10c0e42da1f5b0193e10950dce603371e971385a410c7
                            • Opcode Fuzzy Hash: 67dc8e8edc9798fcdf82e7eccec93e3adf1a7f3fc28df559e5c87949effdb0f7
                            • Instruction Fuzzy Hash: 35317C71200604AADF109F68CC85FFB77A9FF48724F10861DF9A697190DB39AC91DBA4
                            APIs
                            • _memset.LIBCMT ref: 007A2E00
                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007A2E3B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: InfoItemMenu_memset
                            • String ID: 0
                            • API String ID: 2223754486-4108050209
                            • Opcode ID: 601ad14dd8c3f1a3d9f20366c0e08e1d220da23893056a1f65718f7850843839
                            • Instruction ID: faf22fcb35aefbde217461f844a72b31a91c7db6424c88669c6b1d0e5f05ff5e
                            • Opcode Fuzzy Hash: 601ad14dd8c3f1a3d9f20366c0e08e1d220da23893056a1f65718f7850843839
                            • Instruction Fuzzy Hash: 2B31F731604305EBEB248F4CC849B9EBBB5FF86300F244229ED85D61A2E7789986CB50
                            APIs
                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 007C69D0
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007C69DB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: Combobox
                            • API String ID: 3850602802-2096851135
                            • Opcode ID: 9cb1e094cc964463c6e70234c1354880eeceeddcbea8278fb647f20c4a90b18b
                            • Instruction ID: 969d43925c136413a9d11df489fe2fdbf913a5049d12f5c89e44c73bf90b6c70
                            • Opcode Fuzzy Hash: 9cb1e094cc964463c6e70234c1354880eeceeddcbea8278fb647f20c4a90b18b
                            • Instruction Fuzzy Hash: 7011B271700208AFEF119E14CCC0FBB37AAEB893A4F11422DF95897290D679AC9187A0
                            APIs
                              • Part of subcall function 00741D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00741D73
                              • Part of subcall function 00741D35: GetStockObject.GDI32(00000011), ref: 00741D87
                              • Part of subcall function 00741D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00741D91
                            • GetWindowRect.USER32(00000000,?), ref: 007C6EE0
                            • GetSysColor.USER32(00000012), ref: 007C6EFA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                            • String ID: static
                            • API String ID: 1983116058-2160076837
                            • Opcode ID: 1f707aa71da0a5a01270df32f24ed715ee88264249b7fc991987d2f0dbcd6fa6
                            • Instruction ID: bdd8f5d119ed2b13250c27c2bc048b8e0b2718af21af1e6ea225d2932188ba50
                            • Opcode Fuzzy Hash: 1f707aa71da0a5a01270df32f24ed715ee88264249b7fc991987d2f0dbcd6fa6
                            • Instruction Fuzzy Hash: 7421F972610209AFDB04DFA8DD45EFA7BB9FB08314F04462DF955D3250E739E8619B50
                            APIs
                            • GetWindowTextLengthW.USER32(00000000), ref: 007C6C11
                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007C6C20
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: LengthMessageSendTextWindow
                            • String ID: edit
                            • API String ID: 2978978980-2167791130
                            • Opcode ID: dfa2e3423d384a68e8a41fb3d2ad1dfb47412da44e33eb58e478e092a103986e
                            • Instruction ID: e5ca15351fcbac5fd3296b609a3635c3cd027702d4a3e14efb9cab391fe401c4
                            • Opcode Fuzzy Hash: dfa2e3423d384a68e8a41fb3d2ad1dfb47412da44e33eb58e478e092a103986e
                            • Instruction Fuzzy Hash: C4116DB1500108ABEB105E649C85FEA376AEB05378F60472CF965D71D0C779EC919B60
                            APIs
                            • _memset.LIBCMT ref: 007A2F11
                            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 007A2F30
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: InfoItemMenu_memset
                            • String ID: 0
                            • API String ID: 2223754486-4108050209
                            • Opcode ID: 2c4cb21b07f76021e0bdc3bcfd5bc198da67efca4282892ba733b8bd45135c4d
                            • Instruction ID: 6015b2c349a5fbf514f1745ad80823f8d09f36882385a33e4f9ab6513b017807
                            • Opcode Fuzzy Hash: 2c4cb21b07f76021e0bdc3bcfd5bc198da67efca4282892ba733b8bd45135c4d
                            • Instruction Fuzzy Hash: 6F11E636905114EFCB20DB5CDC08F9973B9EB86310F0842B5EC54A72A2D778AD16C791
                            APIs
                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 007B2520
                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 007B2549
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Internet$OpenOption
                            • String ID: <local>
                            • API String ID: 942729171-4266983199
                            • Opcode ID: d98b62db9485b6d70609547bdcfc2677200d44d4936c471c4f8683dca07bec7d
                            • Instruction ID: cc900de6be1c1327287bfd07872b5911cbd464d6209b9fb8bc0091cd85bdcb44
                            • Opcode Fuzzy Hash: d98b62db9485b6d70609547bdcfc2677200d44d4936c471c4f8683dca07bec7d
                            • Instruction Fuzzy Hash: A61102B0202225BADB348F518C98FFBFF68FF06351F10826AF90552041D2786D62DAF0
                            APIs
                              • Part of subcall function 007B830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,007B80C8,?,00000000,?,?), ref: 007B8322
                            • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 007B80CB
                            • htons.WSOCK32(00000000,?,00000000), ref: 007B8108
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ByteCharMultiWidehtonsinet_addr
                            • String ID: 255.255.255.255
                            • API String ID: 2496851823-2422070025
                            • Opcode ID: ab6aaecba0a1240afc38f133804d1dbe8762b0a8749e9eee90d12e10e5d0391f
                            • Instruction ID: 6d1381debe3ec8737b3a266d64f5ffae058c41e2e05df400411a5222afec0def
                            • Opcode Fuzzy Hash: ab6aaecba0a1240afc38f133804d1dbe8762b0a8749e9eee90d12e10e5d0391f
                            • Instruction Fuzzy Hash: 3911A574600209EBDB10AF64DC8AFFDB769FF04350F10852AE91197291DB79A815C696
                            APIs
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                              • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00799355
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_memmove
                            • String ID: ComboBox$ListBox
                            • API String ID: 372448540-1403004172
                            • Opcode ID: 6b4cdbf7748617238d9197f7e7833de4f9d1254a5eb7ffd68577ed2ba04572e0
                            • Instruction ID: 628afa7dbba45d3f10bb17f76b014770f883ebd59bc11495a7361e120edb888d
                            • Opcode Fuzzy Hash: 6b4cdbf7748617238d9197f7e7833de4f9d1254a5eb7ffd68577ed2ba04572e0
                            • Instruction Fuzzy Hash: CC019E71A45218EB9F08EFA8DC96CFE7769BF06320B14061DFA72572D2DB39590C8650
                            APIs
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                              • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 0079924D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_memmove
                            • String ID: ComboBox$ListBox
                            • API String ID: 372448540-1403004172
                            • Opcode ID: c1ddb1cf0ff036cb6baba0efbe24db81332f337cba58c0315da8898fa1486854
                            • Instruction ID: 281d61034b237045d86f2e25a79fe1a142c826d0af89fa7a26d003d47da0ee55
                            • Opcode Fuzzy Hash: c1ddb1cf0ff036cb6baba0efbe24db81332f337cba58c0315da8898fa1486854
                            • Instruction Fuzzy Hash: 6601B171A41108BBDF08EBA4D996EFE77A8AF05300B140119BA1267282EB195E0C8262
                            APIs
                              • Part of subcall function 00747F41: _memmove.LIBCMT ref: 00747F82
                              • Part of subcall function 0079B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0079B0E7
                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 007992D0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClassMessageNameSend_memmove
                            • String ID: ComboBox$ListBox
                            • API String ID: 372448540-1403004172
                            • Opcode ID: a27268e39c8e78c833a9b88715d4b60d80a2952caf368fc9e1272098f886e356
                            • Instruction ID: d27c8714b712e4c5499e276856b489cb04b47f7f36449ce8bd8de48e2c814a9c
                            • Opcode Fuzzy Hash: a27268e39c8e78c833a9b88715d4b60d80a2952caf368fc9e1272098f886e356
                            • Instruction Fuzzy Hash: 9401A771A41108B7DF04E7A4D986EFF77ACAF11300F140119BA12632C2DB195F0C9271
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClassName_wcscmp
                            • String ID: #32770
                            • API String ID: 2292705959-463685578
                            • Opcode ID: b97ff1d0fa7ef3ac9ba44bfc7c7ee0884f7975381d6ae8fd4c97c0bc4d67e554
                            • Instruction ID: b36b3c5dee1023f111337192b80d039cfc765bfedbcabe0c49c85a3f6b0b3f9c
                            • Opcode Fuzzy Hash: b97ff1d0fa7ef3ac9ba44bfc7c7ee0884f7975381d6ae8fd4c97c0bc4d67e554
                            • Instruction Fuzzy Hash: 2EE06172A0022C2BD71097959C49FA7F7ACFB41731F00016BFD14D3040D57499048BD0
                            APIs
                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007981CA
                              • Part of subcall function 00763598: _doexit.LIBCMT ref: 007635A2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Message_doexit
                            • String ID: AutoIt$Error allocating memory.
                            • API String ID: 1993061046-4017498283
                            • Opcode ID: 716cd7ad61416e37b91eb2632cc4e27aba91bfcdd991e5bc556c3fa9d499ef4d
                            • Instruction ID: e29f8ec4d2df1fcf19a47ceb9a17b3d4db0ab2ee2e5dc5d1e39f8abe3a1e5022
                            • Opcode Fuzzy Hash: 716cd7ad61416e37b91eb2632cc4e27aba91bfcdd991e5bc556c3fa9d499ef4d
                            • Instruction Fuzzy Hash: 92D05B323C535C72D61432B47C0FFD676484B15B51F444016FF09A56D38EDD599152ED
                            APIs
                              • Part of subcall function 0077B564: _memset.LIBCMT ref: 0077B571
                              • Part of subcall function 00760B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0077B540,?,?,?,0074100A), ref: 00760B89
                            • IsDebuggerPresent.KERNEL32(?,?,?,0074100A), ref: 0077B544
                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0074100A), ref: 0077B553
                            Strings
                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0077B54E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1419758795.0000000000741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00740000, based on PE: true
                            • Associated: 00000000.00000002.1419594063.0000000000740000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1419904296.00000000007F5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420013289.00000000007FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1420048855.0000000000808000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_740000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                            • API String ID: 3158253471-631824599
                            • Opcode ID: 3514cfd74c6ec3494bdd973a54f7ef7ef8dea12989eacaf144c2b561fd9caac7
                            • Instruction ID: b6a473924975366bd34addce8c28029fea8feffe8d25e48e0b7dc0c6064604bd
                            • Opcode Fuzzy Hash: 3514cfd74c6ec3494bdd973a54f7ef7ef8dea12989eacaf144c2b561fd9caac7
                            • Instruction Fuzzy Hash: F1E06DB0200750CBD720DF29E8087427BE4BF08758F00C92CE44AC2261EBBCD415CBA1