Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8f5WsFcnTc.exe

Overview

General Information

Sample name:8f5WsFcnTc.exe
renamed because original name is a hash value
Original sample name:76605d7a013bd7a9974299a201c92360faec54e4826e774ddca35fae33dab5bf.exe
Analysis ID:1465436
MD5:3b1a4595328f7a92df02b7a116bc4f40
SHA1:cbd3e5a4e18bca01678b6d844ada7764cbd4a209
SHA256:76605d7a013bd7a9974299a201c92360faec54e4826e774ddca35fae33dab5bf
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Found API chain indicative of sandbox detection
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
One or more processes crash
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 8f5WsFcnTc.exe (PID: 7512 cmdline: "C:\Users\user\Desktop\8f5WsFcnTc.exe" MD5: 3B1A4595328F7A92DF02B7A116BC4F40)
    • name.exe (PID: 7564 cmdline: "C:\Users\user\Desktop\8f5WsFcnTc.exe" MD5: 3B1A4595328F7A92DF02B7A116BC4F40)
      • RegSvcs.exe (PID: 7612 cmdline: "C:\Users\user\Desktop\8f5WsFcnTc.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • newfile.exe (PID: 7884 cmdline: "C:\Users\user\AppData\Roaming\newfile\newfile.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 7904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • newfile.exe (PID: 8044 cmdline: "C:\Users\user\AppData\Roaming\newfile\newfile.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 8052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wscript.exe (PID: 8156 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • name.exe (PID: 7188 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 3B1A4595328F7A92DF02B7A116BC4F40)
      • RegSvcs.exe (PID: 2528 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
        • WerFault.exe (PID: 3372 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 24 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "mail.jaszredony.hu", "Username": "info@jaszredony.hu", "Password": "jRedony77"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2698924544.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000002.2698924544.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 16 entries
            SourceRuleDescriptionAuthorStrings
            2.2.name.exe.c70000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.name.exe.c70000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                2.2.name.exe.c70000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x327be:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x32830:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x328ba:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x3294c:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x329b6:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x32a28:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x32abe:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x32b4e:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                2.2.name.exe.c70000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  2.2.name.exe.c70000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    Click to see the 9 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 8156, ProcessName: wscript.exe
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\newfile\newfile.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 7612, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\newfile
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 8156, ProcessName: wscript.exe

                    Data Obfuscation

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\directory\name.exe, ProcessId: 7564, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 2.2.name.exe.c70000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.jaszredony.hu", "Username": "info@jaszredony.hu", "Password": "jRedony77"}
                    Source: C:\Users\user\AppData\Local\directory\name.exeReversingLabs: Detection: 68%
                    Source: 8f5WsFcnTc.exeReversingLabs: Detection: 68%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\directory\name.exeJoe Sandbox ML: detected
                    Source: 8f5WsFcnTc.exeJoe Sandbox ML: detected
                    Source: 8f5WsFcnTc.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: Binary string: RegSvcs.pdb, source: newfile.exe, 00000005.00000000.1596042636.00000000005B2000.00000002.00000001.01000000.00000007.sdmp, newfile.exe.3.dr
                    Source: Binary string: wntdll.pdbUGP source: name.exe, 00000002.00000003.1472055847.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1472200186.0000000003760000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000A.00000003.1772007578.00000000035F0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000A.00000003.1773003803.00000000034A0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: name.exe, 00000002.00000003.1472055847.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1472200186.0000000003760000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000A.00000003.1772007578.00000000035F0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000A.00000003.1773003803.00000000034A0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: RegSvcs.pdb source: newfile.exe, 00000005.00000000.1596042636.00000000005B2000.00000002.00000001.01000000.00000007.sdmp, newfile.exe.3.dr
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00D0DBBE
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CDC2A2 FindFirstFileExW,0_2_00CDC2A2
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D168EE FindFirstFileW,FindClose,0_2_00D168EE
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00D1698F
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D0D076
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D0D3A9
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D19642
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D1979D
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00D19B2B
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00D15C97
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0022DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,2_2_0022DBBE
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001FC2A2 FindFirstFileExW,2_2_001FC2A2
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_002368EE FindFirstFileW,FindClose,2_2_002368EE
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0023698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,2_2_0023698F
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0022D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0022D076
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0022D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0022D3A9
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00239642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00239642
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0023979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0023979D
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00239B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00239B2B
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00235C97 FindFirstFileW,FindNextFileW,FindClose,2_2_00235C97
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior

                    Networking

                    barindex
                    Source: Yara matchFile source: 2.2.name.exe.c70000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.name.exe.1340000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: global trafficTCP traffic: 192.168.2.9:49711 -> 178.238.222.77:26
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: Joe Sandbox ViewIP Address: 178.238.222.77 178.238.222.77
                    Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                    Source: Joe Sandbox ViewASN Name: TARHELYHU TARHELYHU
                    Source: unknownDNS query: name: ip-api.com
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D1CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00D1CE44
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: ip-api.com
                    Source: global trafficDNS traffic detected: DNS query: mail.jaszredony.hu
                    Source: RegSvcs.exe, 00000003.00000002.2700598845.0000000002A64000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2699629746.0000000000DC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: RegSvcs.exe, 00000003.00000002.2703323664.0000000005CF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: RegSvcs.exe, 00000003.00000002.2700598845.0000000002A64000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2699629746.0000000000DC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                    Source: RegSvcs.exe, 00000003.00000002.2700598845.0000000002A64000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2703323664.0000000005CF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
                    Source: RegSvcs.exe, 00000003.00000002.2700598845.0000000002A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: name.exe, 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2698924544.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2699629746.0000000000DDE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2700598845.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, name.exe, 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: RegSvcs.exe, 00000003.00000002.2700598845.0000000002A64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.jaszredony.hu
                    Source: RegSvcs.exe, 00000003.00000002.2700598845.0000000002A64000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2703323664.0000000005CF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2699629746.0000000000DC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: RegSvcs.exe, 00000003.00000002.2700598845.0000000002A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: name.exe, 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2698924544.0000000000402000.00000040.80000000.00040000.00000000.sdmp, name.exe, 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: RegSvcs.exe, 00000003.00000002.2700598845.0000000002A64000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2703323664.0000000005CF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 2.2.name.exe.c70000.1.raw.unpack, SKTzxzsJw.cs.Net Code: IjRjdEv
                    Source: 10.2.name.exe.1340000.1.raw.unpack, SKTzxzsJw.cs.Net Code: IjRjdEv
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00D1EAFF
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D1ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00D1ED6A
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0023ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_0023ED6A
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00D1EAFF
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D0AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00D0AA57
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D39576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00D39576
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00259576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_00259576

                    System Summary

                    barindex
                    Source: 2.2.name.exe.c70000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 2.2.name.exe.c70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.name.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.name.exe.1340000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 8f5WsFcnTc.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: 8f5WsFcnTc.exe, 00000000.00000003.1455789479.00000000038E1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d79847e9-d
                    Source: 8f5WsFcnTc.exe, 00000000.00000003.1455789479.00000000038E1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_2473f3c5-0
                    Source: 8f5WsFcnTc.exe, 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_3881cd3d-a
                    Source: 8f5WsFcnTc.exe, 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_96c47268-a
                    Source: name.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: name.exe, 00000002.00000002.1474022427.0000000000282000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_1c63e7ef-9
                    Source: name.exe, 00000002.00000002.1474022427.0000000000282000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d66bf882-1
                    Source: name.exe, 0000000A.00000000.1761911549.0000000000282000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_21a7dd21-2
                    Source: name.exe, 0000000A.00000000.1761911549.0000000000282000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_25ca3c4a-2
                    Source: 8f5WsFcnTc.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_1fc6e983-8
                    Source: 8f5WsFcnTc.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_f80aa5f6-3
                    Source: name.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_4c727316-5
                    Source: name.exe.0.drString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_09ef644e-8
                    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D0D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00D0D5EB
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00D01201
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D0E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00D0E8F6
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0022E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,2_2_0022E8F6
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D120460_2_00D12046
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CA80600_2_00CA8060
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D082980_2_00D08298
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CDE4FF0_2_00CDE4FF
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CD676B0_2_00CD676B
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D348730_2_00D34873
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CACAF00_2_00CACAF0
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CCCAA00_2_00CCCAA0
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CBCC390_2_00CBCC39
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CD6DD90_2_00CD6DD9
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CA91C00_2_00CA91C0
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CBB1190_2_00CBB119
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC13940_2_00CC1394
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC17060_2_00CC1706
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC781B0_2_00CC781B
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC19B00_2_00CC19B0
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CB997D0_2_00CB997D
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CA79200_2_00CA7920
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC7A4A0_2_00CC7A4A
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC7CA70_2_00CC7CA7
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC1C770_2_00CC1C77
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CD9EEE0_2_00CD9EEE
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D2BE440_2_00D2BE44
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC1F320_2_00CC1F32
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00F536400_2_00F53640
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001CBF402_2_001CBF40
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_002320462_2_00232046
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001C80602_2_001C8060
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_002282982_2_00228298
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001FE4FF2_2_001FE4FF
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001F676B2_2_001F676B
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_002548732_2_00254873
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001ECAA02_2_001ECAA0
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001CCAF02_2_001CCAF0
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001DCC392_2_001DCC39
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001F6DD92_2_001F6DD9
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001DB1192_2_001DB119
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001C91C02_2_001C91C0
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E13942_2_001E1394
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E17062_2_001E1706
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E781B2_2_001E781B
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001C79202_2_001C7920
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001D997D2_2_001D997D
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E19B02_2_001E19B0
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E7A4A2_2_001E7A4A
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E1C772_2_001E1C77
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E7CA72_2_001E7CA7
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0024BE442_2_0024BE44
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001F9EEE2_2_001F9EEE
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E1F322_2_001E1F32
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00C636402_2_00C63640
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_028942083_2_02894208
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0289E7503_2_0289E750
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0289B5903_2_0289B590
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02894AD83_2_02894AD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02893EC03_2_02893EC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061AC8803_2_061AC880
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061AB25C3_2_061AB25C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061B56A03_2_061B56A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061B67003_2_061B6700
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061B24603_2_061B2460
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061BC2A03_2_061BC2A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061BB3583_2_061BB358
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061B7E983_2_061B7E98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061B77B83_2_061B77B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061BE4C03_2_061BE4C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061B00403_2_061B0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061B5DF83_2_061B5DF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06AC35003_2_06AC3500
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_061B00063_2_061B0006
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 10_2_00A5364010_2_00A53640
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 001E0A30 appears 46 times
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 001C9CB3 appears 31 times
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 001E4963 appears 31 times
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 001DF9F2 appears 40 times
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: String function: 00CBF9F2 appears 40 times
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: String function: 00CA9CB3 appears 31 times
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: String function: 00CC4963 appears 31 times
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: String function: 00CC0A30 appears 46 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 24
                    Source: 8f5WsFcnTc.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 2.2.name.exe.c70000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.name.exe.c70000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.name.exe.1340000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.name.exe.1340000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.name.exe.c70000.1.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.c70000.1.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.c70000.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.c70000.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.c70000.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.c70000.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.c70000.1.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.c70000.1.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@15/18@2/2
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D137B5 GetLastError,FormatMessageW,0_2_00D137B5
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D010BF AdjustTokenPrivileges,CloseHandle,0_2_00D010BF
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D016C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00D016C3
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_002210BF AdjustTokenPrivileges,CloseHandle,2_2_002210BF
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_002216C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,2_2_002216C3
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D151CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00D151CD
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D2A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00D2A67C
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D1648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00D1648E
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CA42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00CA42A2
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeFile created: C:\Users\user\AppData\Local\directoryJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7904:120:WilError_03
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2528
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8052:120:WilError_03
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeFile created: C:\Users\user\AppData\Local\Temp\autD2CB.tmpJump to behavior
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                    Source: 8f5WsFcnTc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 8f5WsFcnTc.exeReversingLabs: Detection: 68%
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeFile read: C:\Users\user\Desktop\8f5WsFcnTc.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\8f5WsFcnTc.exe "C:\Users\user\Desktop\8f5WsFcnTc.exe"
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\8f5WsFcnTc.exe"
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\8f5WsFcnTc.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\newfile\newfile.exe "C:\Users\user\AppData\Roaming\newfile\newfile.exe"
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\newfile\newfile.exe "C:\Users\user\AppData\Roaming\newfile\newfile.exe"
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe"
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 24
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\8f5WsFcnTc.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\8f5WsFcnTc.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: 8f5WsFcnTc.exeStatic file information: File size 1181696 > 1048576
                    Source: 8f5WsFcnTc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: 8f5WsFcnTc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: 8f5WsFcnTc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: 8f5WsFcnTc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: 8f5WsFcnTc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: 8f5WsFcnTc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: 8f5WsFcnTc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: RegSvcs.pdb, source: newfile.exe, 00000005.00000000.1596042636.00000000005B2000.00000002.00000001.01000000.00000007.sdmp, newfile.exe.3.dr
                    Source: Binary string: wntdll.pdbUGP source: name.exe, 00000002.00000003.1472055847.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1472200186.0000000003760000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000A.00000003.1772007578.00000000035F0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000A.00000003.1773003803.00000000034A0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: name.exe, 00000002.00000003.1472055847.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1472200186.0000000003760000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000A.00000003.1772007578.00000000035F0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000A.00000003.1773003803.00000000034A0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: RegSvcs.pdb source: newfile.exe, 00000005.00000000.1596042636.00000000005B2000.00000002.00000001.01000000.00000007.sdmp, newfile.exe.3.dr
                    Source: 8f5WsFcnTc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: 8f5WsFcnTc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: 8f5WsFcnTc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: 8f5WsFcnTc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: 8f5WsFcnTc.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00CA42DE
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF668E push ss; retf 0_2_00CF668F
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF6686 push ss; retf 0_2_00CF6687
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF6682 push ss; retf 0_2_00CF6683
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC0A76 push ecx; ret 0_2_00CC0A89
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF4CE6 push 0000003Eh; iretd 0_2_00CF4CE8
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CAD01B push cs; iretd 0_2_00CAD01E
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CB1199 push cs; retf 0_2_00CB119A
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CB119C push cs; retf 0_2_00CB11A2
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CB124F pushad ; iretd 0_2_00CB1252
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CB124D pushad ; iretd 0_2_00CB124E
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CB1247 pushad ; iretd 0_2_00CB124A
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CB125F pushad ; iretd 0_2_00CB1262
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CB1253 pushad ; iretd 0_2_00CB1256
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CB1263 pushad ; iretd 0_2_00CB1266
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF56D8 push eax; iretd 0_2_00CF56DA
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF56E9 push esp; iretd 0_2_00CF56EA
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF57E4 push ebx; iretd 0_2_00CF57FA
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF57E1 push ebx; iretd 0_2_00CF57E2
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF57FC push esi; iretd 0_2_00CF5802
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF1788 push ss; iretd 0_2_00CF1789
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF5788 push eax; iretd 0_2_00CF578A
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF179F push ss; iretd 0_2_00CF17A1
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF5799 push esp; iretd 0_2_00CF579A
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF1797 push ss; iretd 0_2_00CF179D
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF17AC push ss; iretd 0_2_00CF17AD
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF17A8 push ss; iretd 0_2_00CF17A9
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF17A3 push ss; iretd 0_2_00CF17A5
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF57B8 push ebx; iretd 0_2_00CF57CE
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF57B5 push ebx; iretd 0_2_00CF57B6
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF17B0 push ss; iretd 0_2_00CF17B1
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CF5741 push esp; iretd 0_2_00CF5742
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeFile created: C:\Users\user\AppData\Local\directory\name.exeJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\newfile\newfile.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to dropped file
                    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run newfileJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run newfileJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\newfile\newfile.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CBF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00CBF98E
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D31C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00D31C41
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001DF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_001DF98E
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00251C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_00251C41
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 7564, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 7188, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-98241
                    Source: C:\Users\user\AppData\Local\directory\name.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: C63264
                    Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: A53264
                    Source: name.exe, 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2698924544.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2700598845.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, name.exe, 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: BF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: 2930000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: 2780000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: 2BA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: 2DE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeMemory allocated: 2BE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6684Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1188Jump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeAPI coverage: 4.2 %
                    Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 4.5 %
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exe TID: 7964Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exe TID: 8116Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00D0DBBE
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CDC2A2 FindFirstFileExW,0_2_00CDC2A2
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D168EE FindFirstFileW,FindClose,0_2_00D168EE
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00D1698F
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D0D076
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D0D3A9
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D19642
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D1979D
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00D19B2B
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00D15C97
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0022DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,2_2_0022DBBE
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001FC2A2 FindFirstFileExW,2_2_001FC2A2
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_002368EE FindFirstFileW,FindClose,2_2_002368EE
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0023698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,2_2_0023698F
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0022D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0022D076
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0022D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0022D3A9
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00239642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00239642
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0023979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0023979D
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00239B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00239B2B
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00235C97 FindFirstFileW,FindNextFileW,FindClose,2_2_00235C97
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00CA42DE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99657Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99532Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98594Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98250Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98140Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98032Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97907Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97782Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97657Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97327Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97219Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97106Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96669Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96563Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96219Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95777Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95563Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                    Source: RegSvcs.exe, 00000003.00000002.2700598845.0000000002A31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                    Source: name.exe, 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: name.exe, 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                    Source: RegSvcs.exe, 00000003.00000002.2703323664.0000000005CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

                    Anti Debugging

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_028970C0 CheckRemoteDebuggerPresent,3_2_028970C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D1EAA2 BlockInput,0_2_00D1EAA2
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CD2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CD2622
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00CA42DE
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC4CE8 mov eax, dword ptr fs:[00000030h]0_2_00CC4CE8
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00F534D0 mov eax, dword ptr fs:[00000030h]0_2_00F534D0
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00F53530 mov eax, dword ptr fs:[00000030h]0_2_00F53530
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00F51E70 mov eax, dword ptr fs:[00000030h]0_2_00F51E70
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E4CE8 mov eax, dword ptr fs:[00000030h]2_2_001E4CE8
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00C634D0 mov eax, dword ptr fs:[00000030h]2_2_00C634D0
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00C63530 mov eax, dword ptr fs:[00000030h]2_2_00C63530
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00C61E70 mov eax, dword ptr fs:[00000030h]2_2_00C61E70
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 10_2_00A53530 mov eax, dword ptr fs:[00000030h]10_2_00A53530
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 10_2_00A51E70 mov eax, dword ptr fs:[00000030h]10_2_00A51E70
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 10_2_00A534D0 mov eax, dword ptr fs:[00000030h]10_2_00A534D0
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00D00B62
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CD2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CD2622
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CC083F
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC09D5 SetUnhandledExceptionFilter,0_2_00CC09D5
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00CC0C21
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_001F2622
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_001E083F
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E09D5 SetUnhandledExceptionFilter,2_2_001E09D5
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_001E0C21
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base address: 440000Jump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 9F5008Jump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 68E008Jump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00D01201
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CE2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00CE2BA5
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D0B226 SendInput,keybd_event,0_2_00D0B226
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D222DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00D222DA
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\8f5WsFcnTc.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00D00B62
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D01663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00D01663
                    Source: 8f5WsFcnTc.exe, name.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: 8f5WsFcnTc.exe, name.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CC0698 cpuid 0_2_00CC0698
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Users\user\AppData\Roaming\newfile\newfile.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Users\user\AppData\Roaming\newfile\newfile.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\newfile\newfile.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D18195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00D18195
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CFD27A GetUserNameW,0_2_00CFD27A
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CDB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00CDB952
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00CA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00CA42DE
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 2.2.name.exe.c70000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.name.exe.c70000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.name.exe.1340000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.name.exe.1340000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2698924544.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2700598845.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2700598845.0000000002A5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 7564, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7612, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 7188, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: name.exeBinary or memory string: WIN_81
                    Source: name.exeBinary or memory string: WIN_XP
                    Source: name.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                    Source: name.exeBinary or memory string: WIN_XPe
                    Source: name.exeBinary or memory string: WIN_VISTA
                    Source: name.exeBinary or memory string: WIN_7
                    Source: name.exeBinary or memory string: WIN_8
                    Source: Yara matchFile source: 2.2.name.exe.c70000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.name.exe.c70000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.name.exe.1340000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.name.exe.1340000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2698924544.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2700598845.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 7564, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7612, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 7188, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 2.2.name.exe.c70000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.name.exe.c70000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.name.exe.1340000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.name.exe.1340000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2698924544.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2700598845.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2700598845.0000000002A5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 7564, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7612, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 7188, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D21204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00D21204
                    Source: C:\Users\user\Desktop\8f5WsFcnTc.exeCode function: 0_2_00D21806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00D21806
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00241204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,2_2_00241204
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00241806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_00241806
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information111
                    Scripting
                    2
                    Valid Accounts
                    221
                    Windows Management Instrumentation
                    111
                    Scripting
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts1
                    Shared Modules
                    2
                    Valid Accounts
                    2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    3
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCron21
                    Registry Run Keys / Startup Folder
                    21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS138
                    System Information Discovery
                    Distributed Component Object Model121
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script312
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets841
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    2
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts21
                    Registry Run Keys / Startup Folder
                    2
                    Valid Accounts
                    Cached Domain Credentials351
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items351
                    Virtualization/Sandbox Evasion
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Access Token Manipulation
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt312
                    Process Injection
                    /etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                    Hidden Files and Directories
                    Network Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1465436 Sample: 8f5WsFcnTc.exe Startdate: 01/07/2024 Architecture: WINDOWS Score: 100 44 mail.jaszredony.hu 2->44 46 ip-api.com 2->46 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 10 other signatures 2->58 9 8f5WsFcnTc.exe 6 2->9         started        13 wscript.exe 1 2->13         started        15 newfile.exe 2 2->15         started        17 newfile.exe 1 2->17         started        signatures3 process4 file5 40 C:\Users\user\AppData\Local\...\name.exe, PE32 9->40 dropped 74 Binary is likely a compiled AutoIt script file 9->74 76 Found API chain indicative of sandbox detection 9->76 19 name.exe 3 9->19         started        78 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->78 23 name.exe 2 13->23         started        25 conhost.exe 15->25         started        27 conhost.exe 17->27         started        signatures6 process7 file8 38 C:\Users\user\AppData\Roaming\...\name.vbs, data 19->38 dropped 60 Multi AV Scanner detection for dropped file 19->60 62 Binary is likely a compiled AutoIt script file 19->62 64 Machine Learning detection for dropped file 19->64 72 4 other signatures 19->72 29 RegSvcs.exe 15 4 19->29         started        66 Writes to foreign memory regions 23->66 68 Maps a DLL or memory area into another process 23->68 70 Sample uses process hollowing technique 23->70 34 RegSvcs.exe 23->34         started        signatures9 process10 dnsIp11 48 ip-api.com 208.95.112.1, 49710, 80 TUT-ASUS United States 29->48 50 mail.jaszredony.hu 178.238.222.77, 26, 49711 TARHELYHU Hungary 29->50 42 C:\Users\user\AppData\Roaming\...\newfile.exe, PE32 29->42 dropped 80 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 29->80 82 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 29->82 84 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 29->84 86 5 other signatures 29->86 36 WerFault.exe 23 34->36         started        file12 signatures13 process14

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    8f5WsFcnTc.exe68%ReversingLabsWin32.Trojan.AgentTesla
                    8f5WsFcnTc.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\directory\name.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\directory\name.exe68%ReversingLabsWin32.Trojan.AgentTesla
                    C:\Users\user\AppData\Roaming\newfile\newfile.exe0%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                    http://ip-api.com0%URL Reputationsafe
                    http://mail.jaszredony.hu0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.jaszredony.hu
                    178.238.222.77
                    truetrue
                      unknown
                      ip-api.com
                      208.95.112.1
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://ip-api.com/line/?fields=hostingfalse
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://sectigo.com/CPS0RegSvcs.exe, 00000003.00000002.2700598845.0000000002A64000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2703323664.0000000005CF0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://mail.jaszredony.huRegSvcs.exe, 00000003.00000002.2700598845.0000000002A64000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://account.dyn.com/name.exe, 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2698924544.0000000000402000.00000040.80000000.00040000.00000000.sdmp, name.exe, 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000003.00000002.2700598845.0000000002A01000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ip-api.comRegSvcs.exe, 00000003.00000002.2700598845.0000000002A01000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        208.95.112.1
                        ip-api.comUnited States
                        53334TUT-ASUStrue
                        178.238.222.77
                        mail.jaszredony.huHungary
                        43359TARHELYHUtrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1465436
                        Start date and time:2024-07-01 16:33:09 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 25s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:19
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:8f5WsFcnTc.exe
                        renamed because original name is a hash value
                        Original Sample Name:76605d7a013bd7a9974299a201c92360faec54e4826e774ddca35fae33dab5bf.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.expl.evad.winEXE@15/18@2/2
                        EGA Information:
                        • Successful, ratio: 66.7%
                        HCA Information:
                        • Successful, ratio: 99%
                        • Number of executed functions: 55
                        • Number of non-executed functions: 309
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 20.42.73.29
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target newfile.exe, PID 7884 because it is empty
                        • Execution Graph export aborted for target newfile.exe, PID 8044 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: 8f5WsFcnTc.exe
                        TimeTypeDescription
                        10:34:20API Interceptor39x Sleep call for process: RegSvcs.exe modified
                        10:34:58API Interceptor1x Sleep call for process: WerFault.exe modified
                        15:34:22AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run newfile C:\Users\user\AppData\Roaming\newfile\newfile.exe
                        15:34:30AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run newfile C:\Users\user\AppData\Roaming\newfile\newfile.exe
                        15:34:38AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        208.95.112.1ZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • ip-api.com/line/?fields=hosting
                        v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        COTIZACI#U00d3N________________________pdf.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        doc20240625-00073.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • ip-api.com/line/?fields=hosting
                        QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • ip-api.com/line/?fields=hosting
                        178.238.222.77v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                          temp.exeGet hashmaliciousAgentTeslaBrowse
                            FC4311009.exeGet hashmaliciousAgentTeslaBrowse
                              whitegick.exeGet hashmaliciousAgentTeslaBrowse
                                FC4311009.exeGet hashmaliciousAgentTeslaBrowse
                                  FC4311009.exeGet hashmaliciousAgentTeslaBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    mail.jaszredony.huv31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    temp.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    FC4311009.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    whitegick.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    FC4311009.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    FC4311009.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    ip-api.comZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    • 208.95.112.1
                                    v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    COTIZACI#U00d3N________________________pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    doc20240625-00073.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 208.95.112.1
                                    QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    • 208.95.112.1
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    TARHELYHUv31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    temp.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    FC4311009.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    whitegick.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    FC4311009.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    FC4311009.exeGet hashmaliciousAgentTeslaBrowse
                                    • 178.238.222.77
                                    zDAH4anUtC.elfGet hashmaliciousUnknownBrowse
                                    • 178.238.211.25
                                    #U03a3#U03a5#U039c#U0392#U039f#U039b#U0391#U0399#U039f DEV8759-pdf.exeGet hashmaliciousDiscord Token Stealer, GuLoaderBrowse
                                    • 185.51.188.44
                                    #U03a3#U03a5#U039c#U0392#U039f#U039b#U0391#U0399#U039f DEV8759-pdf.exeGet hashmaliciousGuLoaderBrowse
                                    • 185.51.188.44
                                    S#U00d6ZLE#U015eME DEV8759 - pdf.exeGet hashmaliciousGuLoaderBrowse
                                    • 185.51.188.44
                                    TUT-ASUSZkqNrYh5cV.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    rQoutation.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    • 208.95.112.1
                                    v31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    yVtOz1fD5G.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    8w5wHh755H.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    COTIZACI#U00d3N________________________pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    • 208.95.112.1
                                    doc20240625-00073.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 208.95.112.1
                                    QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    • 208.95.112.1
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\Users\user\AppData\Roaming\newfile\newfile.exev31TgVEtHi.exeGet hashmaliciousAgentTeslaBrowse
                                      54dse57Lv7.exeGet hashmaliciousAgentTeslaBrowse
                                        001 Tech. Spec pdf.exeGet hashmaliciousAgentTeslaBrowse
                                          doc -scan file.exeGet hashmaliciousAgentTeslaBrowse
                                            payment order.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
                                                ORDERDATASHEET#PO8738763.scr.exeGet hashmaliciousAgentTesla, RedLine, SugarDump, XWormBrowse
                                                  DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
                                                    temp.exeGet hashmaliciousAgentTeslaBrowse
                                                      Urgent PO.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):65536
                                                        Entropy (8bit):0.5815587572976134
                                                        Encrypted:false
                                                        SSDEEP:96:NmdFIWrPsQhMov7JYqQXIDcQ4c6fcE+cw3tZAX/d5FMT2SlPkpXmTAof/VXT5NHG:mSWrPk0WbkQzuiFuZ24IO8b
                                                        MD5:EF3685F506A65DD8D9F603B7ED7AFED3
                                                        SHA1:8EA3B28E3B7794700919540B22E91BEB614EDCAA
                                                        SHA-256:D689F574899CE7C573CB8B0CC1E5C4FFF3A192F4364CEED91E8E0D1AF44475BD
                                                        SHA-512:1F72A7D3C5DC4D0B7917074395B3AD9040C6C978AD1E947EA8535A7D028AF14C6F4F0F649B83E8F3A9DCD46D50E3B32C6916694365E126BA92F451853DD2BCC8
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.3.1.8.0.8.8.9.2.2.1.4.3.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.3.1.8.0.9.3.2.1.9.0.1.9.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.7.e.4.7.3.2.7.-.a.6.c.d.-.4.a.7.5.-.a.0.2.1.-.f.6.6.6.a.b.a.2.2.f.2.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.c.1.c.3.0.4.7.-.8.7.4.b.-.4.1.b.3.-.9.5.5.7.-.1.0.7.d.a.3.5.c.a.f.6.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.b.a.d._.m.o.d.u.l.e._.i.n.f.o.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.e.0.-.0.0.0.1.-.0.0.1.4.-.4.f.4.6.-.0.c.d.3.c.3.c.b.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.1.9.6.9.7.7.1.b.2.f.0.2.2.f.9.a.8.6.d.7.7.a.c.4.d.4.d.2.3.9.b.e.c.d.f.0.8.d.0.7.!.R.e.g.S.v.c.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):8218
                                                        Entropy (8bit):3.6740285190804585
                                                        Encrypted:false
                                                        SSDEEP:192:R6l7wVeJ5f6EQol6Y0o6zhgmfUipx089b8/sf05Um:R6lXJB6m6Yb6zhgmfUU8kfS
                                                        MD5:4099D6DE3B08AE7A9AB418EDA360EF05
                                                        SHA1:307E107EA0C7BBE5BC1A07FF145580AF78F221B0
                                                        SHA-256:7F925966D06C308A0D32284110014A11C14296010D05E8ECEB469FD1FBD48028
                                                        SHA-512:728D4E36E89620F4A6E5D9FDEF9FEF62356C208AD1A1447A0AD5704528B31EF50FBEB35DD1FCF62C5D5EBACD57B550789BA718589AA03C7AF1A8E0BBE989FE74
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.5.2.8.<./.P.i.
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):4572
                                                        Entropy (8bit):4.435218113979675
                                                        Encrypted:false
                                                        SSDEEP:48:cvIwWl8zskJg77aI9+RWpW8VYzuYm8M4JTHFOi+q87mm30ad:uIjfiI7MA7VSJIifm30ad
                                                        MD5:7E44E5DED0810E7B79ECD6242A4AC509
                                                        SHA1:D86CD1010EEAF549BD1F5828B2A4C232703F9E42
                                                        SHA-256:D19DE4CEE7FF56512A75A4DDD3B31B308FF04B059DB5BB8C203540AE63E23B72
                                                        SHA-512:27BFC425C77CF52E49CCCD65D0D065C40CE0D7B14C938F3DD0A5A14142E6A8BCF75ADF9956C7AE9E5D3C8CD3298185FE6DA55F0D9A89D0F9E740B10A05E3D541
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="392017" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                        Process:C:\Users\user\AppData\Roaming\newfile\newfile.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:modified
                                                        Size (bytes):142
                                                        Entropy (8bit):5.090621108356562
                                                        Encrypted:false
                                                        SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                        MD5:8C0458BB9EA02D50565175E38D577E35
                                                        SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                        SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                        SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):4736
                                                        Entropy (8bit):3.2400817835458087
                                                        Encrypted:false
                                                        SSDEEP:96:pwpIi/kXkkX5kuguW40Q10Qe0Qgs0QX00QB0QVU33d3gdXQKszeuzSzbxGQI5/mG:pSlI+u/VWNQDoeyOkNP
                                                        MD5:B6CCF49E4733F54C9F69594D1BE587F3
                                                        SHA1:2C1A1B24E88ED8711C8C8A379CD67EF88202C010
                                                        SHA-256:0A5CB79FE8757B0347C648CE700A255E5D2DC31C93E549A7AA11723E4020DFF3
                                                        SHA-512:1ACC062521ED078B21345ACB79BD62400A656B53D8ED489D9F6E6C406C8B7A118ACF71AEBFE725C9E9C01CD19052973090BD6AD50A83FB00B9A66C2A0E456352
                                                        Malicious:false
                                                        Preview:......S.n.a.p.s.h.o.t. .s.t.a.t.i.s.t.i.c.s.:.....-. .S.i.g.n.a.t.u.r.e. . . . . . . . . . . . . . . . .:. .P.S.S.D.......-. .F.l.a.g.s./.C.a.p.t.u.r.e.F.l.a.g.s. . . . . . . .:. .0.0.0.0.0.0.0.1./.d.0.0.0.3.9.f.f.......-. .A.u.x. .p.a.g.e.s. . . . . . . . . . . . . . . . .:. .1. .e.n.t.r.i.e.s. .l.o.n.g.......-. .V.A. .s.p.a.c.e. .s.t.r.e.a.m. . . . . . . . . . .:. .3.3.1.2. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .H.a.n.d.l.e. .t.r.a.c.e. .s.t.r.e.a.m. . . . . . .:. .0. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .H.a.n.d.l.e. .s.t.r.e.a.m. . . . . . . . . . . . .:. .9.5.0. .b.y.t.e.s. .i.n. .s.i.z.e.......-. .T.h.r.e.a.d.s. . . . . . . . . . . . . . . . . . .:. .1. .t.h.r.e.a.d.s.......-. .T.h.r.e.a.d. .s.t.r.e.a.m. . . . . . . . . . . . .:. .8.3.2. .b.y.t.e.s. .i.n. .s.i.z.e...........S.n.a.p.s.h.o.t. .p.e.r.f.o.r.m.a.n.c.e. .c.o.u.n.t.e.r.s.:.....-. .T.o.t.a.l.C.y.c.l.e.C.o.u.n.t. . . . . . . . . . .:. .3.0.3.1.4.3.3. .c.y.c.l.e.s.......-. .V.a.C.l.o.n.e.C.y.c.l.e.C.o.u.n.t. . . . . . . . .:.
                                                        Process:C:\Users\user\AppData\Local\directory\name.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):153648
                                                        Entropy (8bit):7.9264848829174195
                                                        Encrypted:false
                                                        SSDEEP:3072:w9JfmIg62LSE9D4/1VQtg7oQu2tcfq/rW+A7KKOMyBkCY24ceGLwh:wLfgv2/N2q7nd/rF9wVh
                                                        MD5:4F05EDB97E7F667D27D4D8704D093E6F
                                                        SHA1:3BD5DDF6FBFE8E3891C24650301F7AE54D3AF854
                                                        SHA-256:EC3FA0AB9956C516AD9CA00DC895926B1A5BFDE5B953C6C481F1E201DDD619FA
                                                        SHA-512:853082AB7C1D6D00D394C8705500DF648B1E1D436824F0178BDE2A95C8812F8A64910F203047C59EBF077A9251C4642B9F470EE10617B919D02A808E9D91BC14
                                                        Malicious:false
                                                        Preview:EA06.......T.VsP.R...7..R.M.5..j.J.U..J...Y.Q.S..\...~....W...U\mg3j.N".[4..^.\h...}5.FfsY,..-.If..,......P...3=...z..v.T.j.T..j5z]>.?..4.sJ.Uk..R..Vg...\I14.eR...j.`....0......*..'...F....*..+...3....z.....U*....J.4.x.....W.D.].@..<.]....D~.._Z......h.J..0.U....!......^.P.......S.T.c.z.B3+.Q' ..J..........?|.....B.Mg.Z.f..+.....C.3...!u..l...f.T.=J..*M+U.U..W..,T....G..&.......I..u...b....k.).....):.5.9...c.h.U).n...._1..`.Q.-K....f.....P.q._9.6.P.Tv..F[....h3....u.J.T.....\i....^.H......T.....[...%.@.]...Z..l..L..".X.....g.m.....A...~}]5zC..].TZ...A...{...U?.f..l. ....i. ."...E@4....$..(.......s...r...\...0.....) ..fIE...........~.y7.z{P.<;...Y..z4ra..h.U/.K3....5...Oz......[:.li.=J.w.T.Ui.ru@.L.vJ..I..[j...V.L.N..ZLg....8...:...j.?....#...^.......C.K.~x.-.....9[:.Vs..r....S3.V.....8...UY4.....m.y...!...V.:.T.u...2..3j..3.Ug5MUz.9....../.V.4. ..{..*...K.P.Q.5...J.T*...R.Z.....P..".V.4.....UjT)..V.Eku*\...G.2p....T...=BA..X ....^.3+.....6.
                                                        Process:C:\Users\user\AppData\Local\directory\name.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):9760
                                                        Entropy (8bit):7.600024436682888
                                                        Encrypted:false
                                                        SSDEEP:192:K7U22a8TpvRLbofttdRtxKY1HH6ucjhaEPrSYda9cqrc/Nj+S9P7cP:K7iJ9tofttdzv167jUs701rOS0+
                                                        MD5:CA7B75E636135CE38EA2BFD5A746AFC1
                                                        SHA1:38ABB6ADB25FFA161D2BD5904AC038CC9D37576D
                                                        SHA-256:93B5E47F15F9ACA44A0C46F032B5AA5307A2017C3451D48D6EAF77B69CCA552F
                                                        SHA-512:CBD51D7327BAB2F550E78369717A9C0A9C675E9A5CEC341ADA27ADDD87F13E872D1D21A1AF821AD06EA8AB014035634EE60F2C44EBA57DDD9555441D47540C87
                                                        Malicious:false
                                                        Preview:EA06..p..Z.Y..p.LnW...a2....Y..oo.M.....a6.N'3I..io....].......K........|...o..o.M.......8.....9.[.30....3....2.Z..k9..6.@.o.l..\......g.9.L.w...\....N..3I.........9..&....r.'.Y...c ....An.H.......F.3<..\..6....`....f@...x..j....Br.....[..0..n3.|.n...\f@5_..h....f.5_..p.U..m.5_....U..n@5_..`.U..@5\..>3...M.^.n.Z..k6.z..o6......@......y..G../Z.M. .....jr.....n.u....$.`./.o8...f.G_T.......@>_.......zk5....i..... ...................`.M..`... ...p...@....'.4...{>K|..c.Mm.@..[..._..p......>Kx#G.o..3|w...G.4..&@8_..kp..i|w.....p.h............7.MnsK....M...;..8..f.0.L..79..f..+..ff6....6.N. ...f...E...Y....3.I.............w............2p....<d....,vb...t....N@!+..'& ....,fo2..n6........r.2.X...c3k..es.Y.!...Gf@....,f.9.N.`. .#7.....c.0.....y..p.h.s.....,vf...|..t.L@...40.....f.....&3....4..@.6.-..p..S....2...S0.N.@.;5.`...9.......k8.....c.P..\.3.wx.....vl........E......y6....p.c3....4..b.!....F ....B5p.L.3........vn.....f....r...B3P.....;8.X...n.............g......k...p...
                                                        Process:C:\Users\user\Desktop\8f5WsFcnTc.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):153648
                                                        Entropy (8bit):7.9264848829174195
                                                        Encrypted:false
                                                        SSDEEP:3072:w9JfmIg62LSE9D4/1VQtg7oQu2tcfq/rW+A7KKOMyBkCY24ceGLwh:wLfgv2/N2q7nd/rF9wVh
                                                        MD5:4F05EDB97E7F667D27D4D8704D093E6F
                                                        SHA1:3BD5DDF6FBFE8E3891C24650301F7AE54D3AF854
                                                        SHA-256:EC3FA0AB9956C516AD9CA00DC895926B1A5BFDE5B953C6C481F1E201DDD619FA
                                                        SHA-512:853082AB7C1D6D00D394C8705500DF648B1E1D436824F0178BDE2A95C8812F8A64910F203047C59EBF077A9251C4642B9F470EE10617B919D02A808E9D91BC14
                                                        Malicious:false
                                                        Preview:EA06.......T.VsP.R...7..R.M.5..j.J.U..J...Y.Q.S..\...~....W...U\mg3j.N".[4..^.\h...}5.FfsY,..-.If..,......P...3=...z..v.T.j.T..j5z]>.?..4.sJ.Uk..R..Vg...\I14.eR...j.`....0......*..'...F....*..+...3....z.....U*....J.4.x.....W.D.].@..<.]....D~.._Z......h.J..0.U....!......^.P.......S.T.c.z.B3+.Q' ..J..........?|.....B.Mg.Z.f..+.....C.3...!u..l...f.T.=J..*M+U.U..W..,T....G..&.......I..u...b....k.).....):.5.9...c.h.U).n...._1..`.Q.-K....f.....P.q._9.6.P.Tv..F[....h3....u.J.T.....\i....^.H......T.....[...%.@.]...Z..l..L..".X.....g.m.....A...~}]5zC..].TZ...A...{...U?.f..l. ....i. ."...E@4....$..(.......s...r...\...0.....) ..fIE...........~.y7.z{P.<;...Y..z4ra..h.U/.K3....5...Oz......[:.li.=J.w.T.Ui.ru@.L.vJ..I..[j...V.L.N..ZLg....8...:...j.?....#...^.......C.K.~x.-.....9[:.Vs..r....S3.V.....8...UY4.....m.y...!...V.:.T.u...2..3j..3.Ug5MUz.9....../.V.4. ..{..*...K.P.Q.5...J.T*...R.Z.....P..".V.4.....UjT)..V.Eku*\...G.2p....T...=BA..X ....^.3+.....6.
                                                        Process:C:\Users\user\Desktop\8f5WsFcnTc.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):9760
                                                        Entropy (8bit):7.600024436682888
                                                        Encrypted:false
                                                        SSDEEP:192:K7U22a8TpvRLbofttdRtxKY1HH6ucjhaEPrSYda9cqrc/Nj+S9P7cP:K7iJ9tofttdzv167jUs701rOS0+
                                                        MD5:CA7B75E636135CE38EA2BFD5A746AFC1
                                                        SHA1:38ABB6ADB25FFA161D2BD5904AC038CC9D37576D
                                                        SHA-256:93B5E47F15F9ACA44A0C46F032B5AA5307A2017C3451D48D6EAF77B69CCA552F
                                                        SHA-512:CBD51D7327BAB2F550E78369717A9C0A9C675E9A5CEC341ADA27ADDD87F13E872D1D21A1AF821AD06EA8AB014035634EE60F2C44EBA57DDD9555441D47540C87
                                                        Malicious:false
                                                        Preview:EA06..p..Z.Y..p.LnW...a2....Y..oo.M.....a6.N'3I..io....].......K........|...o..o.M.......8.....9.[.30....3....2.Z..k9..6.@.o.l..\......g.9.L.w...\....N..3I.........9..&....r.'.Y...c ....An.H.......F.3<..\..6....`....f@...x..j....Br.....[..0..n3.|.n...\f@5_..h....f.5_..p.U..m.5_....U..n@5_..`.U..@5\..>3...M.^.n.Z..k6.z..o6......@......y..G../Z.M. .....jr.....n.u....$.`./.o8...f.G_T.......@>_.......zk5....i..... ...................`.M..`... ...p...@....'.4...{>K|..c.Mm.@..[..._..p......>Kx#G.o..3|w...G.4..&@8_..kp..i|w.....p.h............7.MnsK....M...;..8..f.0.L..79..f..+..ff6....6.N. ...f...E...Y....3.I.............w............2p....<d....,vb...t....N@!+..'& ....,fo2..n6........r.2.X...c3k..es.Y.!...Gf@....,f.9.N.`. .#7.....c.0.....y..p.h.s.....,vf...|..t.L@...40.....f.....&3....4..@.6.-..p..S....2...S0.N.@.;5.`...9.......k8.....c.P..\.3.wx.....vl........E......y6....p.c3....4..b.!....F ....B5p.L.3........vn.....f....r...B3P.....;8.X...n.............g......k...p...
                                                        Process:C:\Users\user\AppData\Local\directory\name.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):153648
                                                        Entropy (8bit):7.9264848829174195
                                                        Encrypted:false
                                                        SSDEEP:3072:w9JfmIg62LSE9D4/1VQtg7oQu2tcfq/rW+A7KKOMyBkCY24ceGLwh:wLfgv2/N2q7nd/rF9wVh
                                                        MD5:4F05EDB97E7F667D27D4D8704D093E6F
                                                        SHA1:3BD5DDF6FBFE8E3891C24650301F7AE54D3AF854
                                                        SHA-256:EC3FA0AB9956C516AD9CA00DC895926B1A5BFDE5B953C6C481F1E201DDD619FA
                                                        SHA-512:853082AB7C1D6D00D394C8705500DF648B1E1D436824F0178BDE2A95C8812F8A64910F203047C59EBF077A9251C4642B9F470EE10617B919D02A808E9D91BC14
                                                        Malicious:false
                                                        Preview:EA06.......T.VsP.R...7..R.M.5..j.J.U..J...Y.Q.S..\...~....W...U\mg3j.N".[4..^.\h...}5.FfsY,..-.If..,......P...3=...z..v.T.j.T..j5z]>.?..4.sJ.Uk..R..Vg...\I14.eR...j.`....0......*..'...F....*..+...3....z.....U*....J.4.x.....W.D.].@..<.]....D~.._Z......h.J..0.U....!......^.P.......S.T.c.z.B3+.Q' ..J..........?|.....B.Mg.Z.f..+.....C.3...!u..l...f.T.=J..*M+U.U..W..,T....G..&.......I..u...b....k.).....):.5.9...c.h.U).n...._1..`.Q.-K....f.....P.q._9.6.P.Tv..F[....h3....u.J.T.....\i....^.H......T.....[...%.@.]...Z..l..L..".X.....g.m.....A...~}]5zC..].TZ...A...{...U?.f..l. ....i. ."...E@4....$..(.......s...r...\...0.....) ..fIE...........~.y7.z{P.<;...Y..z4ra..h.U/.K3....5...Oz......[:.li.=J.w.T.Ui.ru@.L.vJ..I..[j...V.L.N..ZLg....8...:...j.?....#...^.......C.K.~x.-.....9[:.Vs..r....S3.V.....8...UY4.....m.y...!...V.:.T.u...2..3j..3.Ug5MUz.9....../.V.4. ..{..*...K.P.Q.5...J.T*...R.Z.....P..".V.4.....UjT)..V.Eku*\...G.2p....T...=BA..X ....^.3+.....6.
                                                        Process:C:\Users\user\AppData\Local\directory\name.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):9760
                                                        Entropy (8bit):7.600024436682888
                                                        Encrypted:false
                                                        SSDEEP:192:K7U22a8TpvRLbofttdRtxKY1HH6ucjhaEPrSYda9cqrc/Nj+S9P7cP:K7iJ9tofttdzv167jUs701rOS0+
                                                        MD5:CA7B75E636135CE38EA2BFD5A746AFC1
                                                        SHA1:38ABB6ADB25FFA161D2BD5904AC038CC9D37576D
                                                        SHA-256:93B5E47F15F9ACA44A0C46F032B5AA5307A2017C3451D48D6EAF77B69CCA552F
                                                        SHA-512:CBD51D7327BAB2F550E78369717A9C0A9C675E9A5CEC341ADA27ADDD87F13E872D1D21A1AF821AD06EA8AB014035634EE60F2C44EBA57DDD9555441D47540C87
                                                        Malicious:false
                                                        Preview:EA06..p..Z.Y..p.LnW...a2....Y..oo.M.....a6.N'3I..io....].......K........|...o..o.M.......8.....9.[.30....3....2.Z..k9..6.@.o.l..\......g.9.L.w...\....N..3I.........9..&....r.'.Y...c ....An.H.......F.3<..\..6....`....f@...x..j....Br.....[..0..n3.|.n...\f@5_..h....f.5_..p.U..m.5_....U..n@5_..`.U..@5\..>3...M.^.n.Z..k6.z..o6......@......y..G../Z.M. .....jr.....n.u....$.`./.o8...f.G_T.......@>_.......zk5....i..... ...................`.M..`... ...p...@....'.4...{>K|..c.Mm.@..[..._..p......>Kx#G.o..3|w...G.4..&@8_..kp..i|w.....p.h............7.MnsK....M...;..8..f.0.L..79..f..+..ff6....6.N. ...f...E...Y....3.I.............w............2p....<d....,vb...t....N@!+..'& ....,fo2..n6........r.2.X...c3k..es.Y.!...Gf@....,f.9.N.`. .#7.....c.0.....y..p.h.s.....,vf...|..t.L@...40.....f.....&3....4..@.6.-..p..S....2...S0.N.@.;5.`...9.......k8.....c.P..\.3.wx.....vl........E......y6....p.c3....4..b.!....F ....B5p.L.3........vn.....f....r...B3P.....;8.X...n.............g......k...p...
                                                        Process:C:\Users\user\Desktop\8f5WsFcnTc.exe
                                                        File Type:ASCII text, with very long lines (28674), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):28674
                                                        Entropy (8bit):3.5868067007788773
                                                        Encrypted:false
                                                        SSDEEP:384:yJejrk92+feAZBpPlWrqGE7sKJmJEcAgNlLfdxN0/0+TPCLr7HhC:se8E+eAHpPlWrRJEcAgNpzgPcxC
                                                        MD5:2AAA7B7930CDDC427CF97397FAE04C51
                                                        SHA1:3F6D95A1329A2EA064C9427B6139323C3F8EECE5
                                                        SHA-256:72AA831E1CB8286C8FBA0408ABA377DD57717735E326529F950A96A8D36AFACA
                                                        SHA-512:B2540C50E492CDE805B6277BF216A8840CE6061ADC2D37641B5A95279EDDA3A2F4E23DA3DFC5B0964F6B99E0F9BB9BD055BC96A2957DDCE87F3051D74C1AC449
                                                        Malicious:false
                                                        Preview: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
                                                        Process:C:\Users\user\Desktop\8f5WsFcnTc.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):244736
                                                        Entropy (8bit):6.645349281875858
                                                        Encrypted:false
                                                        SSDEEP:6144:1KFg94PepDRyhZdzanZ50wvLVz4DpxVNKm6ZFxnNIT5P/fXtP9+5v:IW94GpDRKDOnf0ez4LDKmyA3V9+1
                                                        MD5:64365F14BF8C2965CFC7A2CC25EB9C22
                                                        SHA1:F15F3895247EA0CD2373D36C7494885C3B9CB91E
                                                        SHA-256:E63C7D4475AD0D2319C0E49E7E6D16489EC9106D163B0005807E3FDBC013168D
                                                        SHA-512:4D2250C3F85CDAAA1028AD790F2B3E5E1AF568185C58D5B548575E9353F8B929B99BB83B3FE1032B3082EFD5276D4C108028B851A63A8E6AADE49617DDD74D7F
                                                        Malicious:false
                                                        Preview:...LWU9PPKP9..GR.7YQ6ZYJ.TU9PTKP9Y8GR07YQ6ZYJLTU9PTKP9Y8GR07.Q6ZWU.ZU.Y.j.8..f.X^*qF(6->58.35%>V-.%7.E,?.37j....=;/5.T5Mv07YQ6ZY..TUuQWKOy?^GR07YQ6Z.JNU^8[TK.:Y8OR07YQ6$.ILTu9PT.S9Y8.R0.YQ6XYJHTU9PTKP=Y8GR07YQ.^YJNTU9PTKR9..GR 7YA6ZYJ\TU)PTKP9Y(GR07YQ6ZYJLx.:P.KP9Y.DRv2YQ6ZYJLTU9PTKP9Y8GR03Y]6ZYJLTU9PTKP9Y8GR07YQ6ZYJLTU9PTKP9Y8GR07YQ6ZYJLTU9PTkP9Q8GR07YQ6ZYJDtU9.TKP9Y8GR07Y.B?!>LTU..WKP.Y8G.37YS6ZYJLTU9PTKP9Y.GRP.+"D9YJL.P9PT.S9Y>GR0.ZQ6ZYJLTU9PTKPyY8.|BR5>UZYFLTU9PPKP;Y8G.37YQ6ZYJLTU9PT.P9.8GR07YQ6ZYJLTU9P4.S9Y8GRx7YQ4Z\JD.W9tbJP:Y8GS07_Q6ZYJLTU9PTKP9Y8GR07YQ6ZYJLTU9PTKP9Y8GR07YQ6ZYJLI........EyXR0.w.=.I..F..-..6.-.)$...pW.....%R..9.7w..P...?.\P@Q.....'YA91.AuV+.I...vqM.s.T^.#..'x.:S..}........{V%h...8..Z?9e1I)T"|cV?0D3.H.UU9PT.......^!.lwZER`GA....m*?.....HZYJ(TU9"TKPXY8G.07Y>6ZY$LTUGPTK.9Y8.R07.Q6ZnJLTp9PT&P9Y.GR0IYQ6.$EC...9'.9Y8GR...a.7........fH.F.0..R....Q.._<.'z....>..:z.N.'Rvw.SJV=\:@V3;d_}...mVQ=UVLT:U.I...p.|.u..!..j#.;R07YQ6.YJ.TU9..K.9Y8.R.7..6ZY.T.9.T..Y
                                                        Process:C:\Users\user\Desktop\8f5WsFcnTc.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1181696
                                                        Entropy (8bit):6.955417618221877
                                                        Encrypted:false
                                                        SSDEEP:24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8aG3n5Bb3dKcuSD:sTvC/MTQYxsWR7ae5/Kcv
                                                        MD5:3B1A4595328F7A92DF02B7A116BC4F40
                                                        SHA1:CBD3E5A4E18BCA01678B6D844ADA7764CBD4A209
                                                        SHA-256:76605D7A013BD7A9974299A201C92360FAEC54E4826E774DDCA35FAE33DAB5BF
                                                        SHA-512:590C07160FD86816573C5C80148C20392A0E2FAA3FA4725F34FFE87B9C65B258E1A39CF744A3F3E4F7F920FB471B24F75ACF35ABEEC56D5A1CBB35B0BE7DA28F
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 68%
                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L....xf.........."..........X......w.............@..........................`.......M....@...@.......@.....................d...|....@..L........................u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc...L....@......................@..@.reloc...u.......v..................@..B........................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\directory\name.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):266
                                                        Entropy (8bit):3.417598043482351
                                                        Encrypted:false
                                                        SSDEEP:6:DMM8lfm3OOQdUfclgMsUEZ+lX1Al1AE6nriIM8lfQVn:DsO+vNlgMsQ1A1z4mA2n
                                                        MD5:101BA0B4EF2B92F815E5087BD9B5B42E
                                                        SHA1:E064699D7A775A592F82434C1AD13A1CEB73ED42
                                                        SHA-256:D229E129C06D8D6B113C3E41C27FBC445976AF919AD7CA470BEF16D0D303783D
                                                        SHA-512:ED38ED876CD047B6BCDD98A3948890C6867A0C37361FE451C0A6C2DD38C7AE75EA55DDC9B360B08831382E7B3CC42E2745DA7081A08AAA0300AD297D30514D5E
                                                        Malicious:true
                                                        Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.t.i.n.a.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.d.i.r.e.c.t.o.r.y.\.n.a.m.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):45984
                                                        Entropy (8bit):6.16795797263964
                                                        Encrypted:false
                                                        SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                        MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                        SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                        SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                        SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: v31TgVEtHi.exe, Detection: malicious, Browse
                                                        • Filename: 54dse57Lv7.exe, Detection: malicious, Browse
                                                        • Filename: 001 Tech. Spec pdf.exe, Detection: malicious, Browse
                                                        • Filename: doc -scan file.exe, Detection: malicious, Browse
                                                        • Filename: payment order.exe, Detection: malicious, Browse
                                                        • Filename: DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exe, Detection: malicious, Browse
                                                        • Filename: ORDERDATASHEET#PO8738763.scr.exe, Detection: malicious, Browse
                                                        • Filename: DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exe, Detection: malicious, Browse
                                                        • Filename: temp.exe, Detection: malicious, Browse
                                                        • Filename: Urgent PO.exe, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                        Process:C:\Users\user\AppData\Roaming\newfile\newfile.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1141
                                                        Entropy (8bit):4.442398121585593
                                                        Encrypted:false
                                                        SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                        MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                        SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                        SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                        SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                        Malicious:false
                                                        Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.955417618221877
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:8f5WsFcnTc.exe
                                                        File size:1'181'696 bytes
                                                        MD5:3b1a4595328f7a92df02b7a116bc4f40
                                                        SHA1:cbd3e5a4e18bca01678b6d844ada7764cbd4a209
                                                        SHA256:76605d7a013bd7a9974299a201c92360faec54e4826e774ddca35fae33dab5bf
                                                        SHA512:590c07160fd86816573c5c80148c20392a0e2faa3fa4725f34ffe87b9c65b258e1a39cf744a3f3e4f7f920fb471b24f75acf35abeec56d5a1cbb35b0be7da28f
                                                        SSDEEP:24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8aG3n5Bb3dKcuSD:sTvC/MTQYxsWR7ae5/Kcv
                                                        TLSH:E645AE03738D812EFF9B91321A76E23156BC6F270123A55F32D85D7EB9701A5063E6E2
                                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                        Icon Hash:6ced8d96b2ace4b2
                                                        Entrypoint:0x420577
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x6678AACE [Sun Jun 23 23:07:58 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                                        Instruction
                                                        call 00007F1E18EB2363h
                                                        jmp 00007F1E18EB1C6Fh
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F1E18EB1E4Dh
                                                        mov dword ptr [esi], 0049FDF0h
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FDF8h
                                                        mov dword ptr [ecx], 0049FDF0h
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F1E18EB1E1Ah
                                                        mov dword ptr [esi], 0049FE0Ch
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FE14h
                                                        mov dword ptr [ecx], 0049FE0Ch
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        and dword ptr [eax], 00000000h
                                                        and dword ptr [eax+04h], 00000000h
                                                        push eax
                                                        mov eax, dword ptr [ebp+08h]
                                                        add eax, 04h
                                                        push eax
                                                        call 00007F1E18EB4A0Dh
                                                        pop ecx
                                                        pop ecx
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        lea eax, dword ptr [ecx+04h]
                                                        mov dword ptr [ecx], 0049FDD0h
                                                        push eax
                                                        call 00007F1E18EB4A58h
                                                        pop ecx
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        push eax
                                                        call 00007F1E18EB4A41h
                                                        test byte ptr [ebp+08h], 00000001h
                                                        pop ecx
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x49d4c.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x11e0000x7594.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xd40000x49d4c0x49e007b60e02e213ebf11fb84f5dd962087c1False0.7681432423857868data7.478684822621651IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x11e0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xd44580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xd45800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xd46a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xd47d00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 34556 x 34556 px/mEnglishGreat Britain0.07952797823258015
                                                        RT_MENU0xe4ff80x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xe50480x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xe55dc0x68adataEnglishGreat Britain0.2735961768219833
                                                        RT_STRING0xe5c680x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xe60f80x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xe66f40x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xe6d500x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xe71b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xe73100x364eedata1.0003416559524558
                                                        RT_GROUP_ICON0x11d8000x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0x11d8140x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0x11d8280x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0x11d83c0x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0x11d8500x10cdataEnglishGreat Britain0.5970149253731343
                                                        RT_MANIFEST0x11d95c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jul 1, 2024 16:34:20.094026089 CEST4971080192.168.2.9208.95.112.1
                                                        Jul 1, 2024 16:34:20.099081993 CEST8049710208.95.112.1192.168.2.9
                                                        Jul 1, 2024 16:34:20.099174976 CEST4971080192.168.2.9208.95.112.1
                                                        Jul 1, 2024 16:34:20.099538088 CEST4971080192.168.2.9208.95.112.1
                                                        Jul 1, 2024 16:34:20.104326010 CEST8049710208.95.112.1192.168.2.9
                                                        Jul 1, 2024 16:34:20.568973064 CEST8049710208.95.112.1192.168.2.9
                                                        Jul 1, 2024 16:34:20.613765001 CEST4971080192.168.2.9208.95.112.1
                                                        Jul 1, 2024 16:34:21.545663118 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:21.552422047 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:21.552633047 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:22.811178923 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:22.811548948 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:22.816392899 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.014241934 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.016508102 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:23.021410942 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.217020035 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.222819090 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:23.229692936 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.433963060 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.434021950 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.434034109 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.434047937 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.434175014 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:23.528855085 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.559345007 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:23.564234018 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.758737087 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.772218943 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:23.777767897 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.971975088 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:23.974436045 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:23.980619907 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:24.174834967 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:24.175241947 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:24.180109024 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:25.907798052 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:25.908222914 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:25.913054943 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:26.108114958 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:26.109525919 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:34:26.109591007 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:26.118097067 CEST4971126192.168.2.9178.238.222.77
                                                        Jul 1, 2024 16:34:26.123286963 CEST2649711178.238.222.77192.168.2.9
                                                        Jul 1, 2024 16:35:11.489381075 CEST4971080192.168.2.9208.95.112.1
                                                        Jul 1, 2024 16:35:11.496515989 CEST8049710208.95.112.1192.168.2.9
                                                        Jul 1, 2024 16:35:11.496679068 CEST4971080192.168.2.9208.95.112.1
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jul 1, 2024 16:34:20.049165010 CEST5357253192.168.2.91.1.1.1
                                                        Jul 1, 2024 16:34:20.085066080 CEST53535721.1.1.1192.168.2.9
                                                        Jul 1, 2024 16:34:21.477719069 CEST5071053192.168.2.91.1.1.1
                                                        Jul 1, 2024 16:34:21.544591904 CEST53507101.1.1.1192.168.2.9
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Jul 1, 2024 16:34:20.049165010 CEST192.168.2.91.1.1.10x1823Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                        Jul 1, 2024 16:34:21.477719069 CEST192.168.2.91.1.1.10xe7ceStandard query (0)mail.jaszredony.huA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Jul 1, 2024 16:34:20.085066080 CEST1.1.1.1192.168.2.90x1823No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                        Jul 1, 2024 16:34:21.544591904 CEST1.1.1.1192.168.2.90xe7ceNo error (0)mail.jaszredony.hu178.238.222.77A (IP address)IN (0x0001)false
                                                        • ip-api.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.949710208.95.112.1807612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jul 1, 2024 16:34:20.099538088 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                        Host: ip-api.com
                                                        Connection: Keep-Alive
                                                        Jul 1, 2024 16:34:20.568973064 CEST175INHTTP/1.1 200 OK
                                                        Date: Mon, 01 Jul 2024 14:34:20 GMT
                                                        Content-Type: text/plain; charset=utf-8
                                                        Content-Length: 6
                                                        Access-Control-Allow-Origin: *
                                                        X-Ttl: 60
                                                        X-Rl: 44
                                                        Data Raw: 66 61 6c 73 65 0a
                                                        Data Ascii: false


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:10:34:15
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\Desktop\8f5WsFcnTc.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\8f5WsFcnTc.exe"
                                                        Imagebase:0xca0000
                                                        File size:1'181'696 bytes
                                                        MD5 hash:3B1A4595328F7A92DF02B7A116BC4F40
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:10:34:16
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\directory\name.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\8f5WsFcnTc.exe"
                                                        Imagebase:0x1c0000
                                                        File size:1'181'696 bytes
                                                        MD5 hash:3B1A4595328F7A92DF02B7A116BC4F40
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000002.00000002.1474396665.0000000000C70000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                        Antivirus matches:
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 68%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:3
                                                        Start time:10:34:18
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\8f5WsFcnTc.exe"
                                                        Imagebase:0x6d0000
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2698924544.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2698924544.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2700598845.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2700598845.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2700598845.0000000002A5E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:5
                                                        Start time:10:34:30
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Roaming\newfile\newfile.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
                                                        Imagebase:0x5b0000
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 0%, ReversingLabs
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:6
                                                        Start time:10:34:30
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff70f010000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:10:34:38
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Roaming\newfile\newfile.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
                                                        Imagebase:0x980000
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:10:34:38
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff70f010000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:10:34:46
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\System32\wscript.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                                                        Imagebase:0x7ff6bca20000
                                                        File size:170'496 bytes
                                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:10
                                                        Start time:10:34:47
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\directory\name.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                                                        Imagebase:0x1c0000
                                                        File size:1'181'696 bytes
                                                        MD5 hash:3B1A4595328F7A92DF02B7A116BC4F40
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 0000000A.00000002.1774487883.0000000001340000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:10:34:48
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                                                        Imagebase:0x440000
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:14
                                                        Start time:10:34:48
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 24
                                                        Imagebase:0xb0000
                                                        File size:483'680 bytes
                                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:3%
                                                          Dynamic/Decrypted Code Coverage:0.4%
                                                          Signature Coverage:2.8%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:52
                                                          execution_graph 97092 f523b0 97106 f50000 97092->97106 97094 f5248b 97109 f522a0 97094->97109 97112 f534d0 GetPEB 97106->97112 97108 f5068b 97108->97094 97110 f522a9 Sleep 97109->97110 97111 f522b7 97110->97111 97113 f534fa 97112->97113 97113->97108 97114 ca1cad SystemParametersInfoW 97115 ca2de3 97116 ca2df0 __wsopen_s 97115->97116 97117 ca2e09 97116->97117 97118 ce2c2b ___scrt_fastfail 97116->97118 97131 ca3aa2 97117->97131 97120 ce2c47 GetOpenFileNameW 97118->97120 97122 ce2c96 97120->97122 97188 ca6b57 97122->97188 97126 ce2cab 97126->97126 97128 ca2e27 97159 ca44a8 97128->97159 97200 ce1f50 97131->97200 97134 ca3ae9 97206 caa6c3 97134->97206 97135 ca3ace 97136 ca6b57 22 API calls 97135->97136 97138 ca3ada 97136->97138 97202 ca37a0 97138->97202 97141 ca2da5 97142 ce1f50 __wsopen_s 97141->97142 97143 ca2db2 GetLongPathNameW 97142->97143 97144 ca6b57 22 API calls 97143->97144 97145 ca2dda 97144->97145 97146 ca3598 97145->97146 97257 caa961 97146->97257 97149 ca3aa2 23 API calls 97150 ca35b5 97149->97150 97151 ca35c0 97150->97151 97155 ce32eb 97150->97155 97262 ca515f 97151->97262 97157 ce330d 97155->97157 97274 cbce60 41 API calls 97155->97274 97158 ca35df 97158->97128 97275 ca4ecb 97159->97275 97162 ce3833 97297 d12cf9 97162->97297 97163 ca4ecb 94 API calls 97165 ca44e1 97163->97165 97165->97162 97167 ca44e9 97165->97167 97166 ce3848 97168 ce384c 97166->97168 97169 ce3869 97166->97169 97171 ce3854 97167->97171 97172 ca44f5 97167->97172 97341 ca4f39 97168->97341 97170 cbfe0b 22 API calls 97169->97170 97187 ce38ae 97170->97187 97347 d0da5a 82 API calls 97171->97347 97340 ca940c 136 API calls 2 library calls 97172->97340 97176 ce3862 97176->97169 97177 ca2e31 97178 ca4f39 68 API calls 97181 ce3a5f 97178->97181 97181->97178 97350 d0989b 82 API calls __wsopen_s 97181->97350 97184 ca9cb3 22 API calls 97184->97187 97187->97181 97187->97184 97323 d0967e 97187->97323 97326 caa4a1 97187->97326 97334 ca3ff7 97187->97334 97348 d095ad 42 API calls _wcslen 97187->97348 97349 d10b5a 22 API calls 97187->97349 97189 ce4ba1 97188->97189 97191 ca6b67 _wcslen 97188->97191 97190 ca93b2 22 API calls 97189->97190 97192 ce4baa 97190->97192 97193 ca6b7d 97191->97193 97194 ca6ba2 97191->97194 97192->97192 97982 ca6f34 22 API calls 97193->97982 97195 cbfddb 22 API calls 97194->97195 97197 ca6bae 97195->97197 97199 cbfe0b 22 API calls 97197->97199 97198 ca6b85 __fread_nolock 97198->97126 97199->97198 97201 ca3aaf GetFullPathNameW 97200->97201 97201->97134 97201->97135 97203 ca37ae 97202->97203 97212 ca93b2 97203->97212 97205 ca2e12 97205->97141 97207 caa6dd 97206->97207 97208 caa6d0 97206->97208 97209 cbfddb 22 API calls 97207->97209 97208->97138 97210 caa6e7 97209->97210 97211 cbfe0b 22 API calls 97210->97211 97211->97208 97213 ca93c0 97212->97213 97215 ca93c9 __fread_nolock 97212->97215 97213->97215 97216 caaec9 97213->97216 97215->97205 97217 caaed9 __fread_nolock 97216->97217 97218 caaedc 97216->97218 97217->97215 97222 cbfddb 97218->97222 97220 caaee7 97232 cbfe0b 97220->97232 97223 cbfde0 97222->97223 97225 cbfdfa 97223->97225 97228 cbfdfc 97223->97228 97242 ccea0c 97223->97242 97249 cc4ead 7 API calls 2 library calls 97223->97249 97225->97220 97227 cc066d 97251 cc32a4 RaiseException 97227->97251 97228->97227 97250 cc32a4 RaiseException 97228->97250 97231 cc068a 97231->97220 97234 cbfddb 97232->97234 97233 ccea0c ___std_exception_copy 21 API calls 97233->97234 97234->97233 97235 cbfdfa 97234->97235 97237 cbfdfc 97234->97237 97254 cc4ead 7 API calls 2 library calls 97234->97254 97235->97217 97238 cc066d 97237->97238 97255 cc32a4 RaiseException 97237->97255 97256 cc32a4 RaiseException 97238->97256 97241 cc068a 97241->97217 97247 cd3820 pre_c_initialization 97242->97247 97243 cd385e 97253 ccf2d9 20 API calls __dosmaperr 97243->97253 97244 cd3849 RtlAllocateHeap 97246 cd385c 97244->97246 97244->97247 97246->97223 97247->97243 97247->97244 97252 cc4ead 7 API calls 2 library calls 97247->97252 97249->97223 97250->97227 97251->97231 97252->97247 97253->97246 97254->97234 97255->97238 97256->97241 97258 cbfe0b 22 API calls 97257->97258 97259 caa976 97258->97259 97260 cbfddb 22 API calls 97259->97260 97261 ca35aa 97260->97261 97261->97149 97263 ca516e 97262->97263 97267 ca518f __fread_nolock 97262->97267 97265 cbfe0b 22 API calls 97263->97265 97264 cbfddb 22 API calls 97266 ca35cc 97264->97266 97265->97267 97268 ca35f3 97266->97268 97267->97264 97269 ca3605 97268->97269 97273 ca3624 __fread_nolock 97268->97273 97271 cbfe0b 22 API calls 97269->97271 97270 cbfddb 22 API calls 97272 ca363b 97270->97272 97271->97273 97272->97158 97273->97270 97274->97155 97351 ca4e90 LoadLibraryA 97275->97351 97280 ce3ccf 97282 ca4f39 68 API calls 97280->97282 97281 ca4ef6 LoadLibraryExW 97359 ca4e59 LoadLibraryA 97281->97359 97284 ce3cd6 97282->97284 97286 ca4e59 3 API calls 97284->97286 97288 ce3cde 97286->97288 97381 ca50f5 97288->97381 97289 ca4f20 97289->97288 97290 ca4f2c 97289->97290 97292 ca4f39 68 API calls 97290->97292 97294 ca44cd 97292->97294 97294->97162 97294->97163 97296 ce3d05 97298 d12d15 97297->97298 97299 ca511f 64 API calls 97298->97299 97300 d12d29 97299->97300 97652 d12e66 97300->97652 97303 d12d3f 97303->97166 97304 ca50f5 40 API calls 97305 d12d56 97304->97305 97306 ca50f5 40 API calls 97305->97306 97307 d12d66 97306->97307 97308 ca50f5 40 API calls 97307->97308 97309 d12d81 97308->97309 97310 ca50f5 40 API calls 97309->97310 97311 d12d9c 97310->97311 97312 ca511f 64 API calls 97311->97312 97313 d12db3 97312->97313 97314 ccea0c ___std_exception_copy 21 API calls 97313->97314 97315 d12dba 97314->97315 97316 ccea0c ___std_exception_copy 21 API calls 97315->97316 97317 d12dc4 97316->97317 97318 ca50f5 40 API calls 97317->97318 97319 d12dd8 97318->97319 97320 d128fe 27 API calls 97319->97320 97321 d12dee 97320->97321 97321->97303 97658 d122ce 97321->97658 97324 cbfe0b 22 API calls 97323->97324 97325 d096ae __fread_nolock 97324->97325 97325->97187 97327 caa52b 97326->97327 97332 caa4b1 __fread_nolock 97326->97332 97329 cbfe0b 22 API calls 97327->97329 97328 cbfddb 22 API calls 97330 caa4b8 97328->97330 97329->97332 97331 cbfddb 22 API calls 97330->97331 97333 caa4d6 97330->97333 97331->97333 97332->97328 97333->97187 97335 ca400a 97334->97335 97337 ca40ae 97334->97337 97336 cbfe0b 22 API calls 97335->97336 97338 ca403c 97335->97338 97336->97338 97337->97187 97338->97337 97339 cbfddb 22 API calls 97338->97339 97339->97338 97340->97177 97342 ca4f43 97341->97342 97344 ca4f4a 97341->97344 97343 cce678 67 API calls 97342->97343 97343->97344 97345 ca4f6a FreeLibrary 97344->97345 97346 ca4f59 97344->97346 97345->97346 97346->97171 97347->97176 97348->97187 97349->97187 97350->97181 97352 ca4ea8 GetProcAddress 97351->97352 97353 ca4ec6 97351->97353 97354 ca4eb8 97352->97354 97356 cce5eb 97353->97356 97354->97353 97355 ca4ebf FreeLibrary 97354->97355 97355->97353 97389 cce52a 97356->97389 97358 ca4eea 97358->97280 97358->97281 97360 ca4e6e GetProcAddress 97359->97360 97361 ca4e8d 97359->97361 97362 ca4e7e 97360->97362 97364 ca4f80 97361->97364 97362->97361 97363 ca4e86 FreeLibrary 97362->97363 97363->97361 97365 cbfe0b 22 API calls 97364->97365 97366 ca4f95 97365->97366 97457 ca5722 97366->97457 97368 ca4fa1 __fread_nolock 97369 ce3d1d 97368->97369 97370 ca50a5 97368->97370 97380 ca4fdc 97368->97380 97471 d1304d 74 API calls 97369->97471 97460 ca42a2 CreateStreamOnHGlobal 97370->97460 97373 ce3d22 97375 ca511f 64 API calls 97373->97375 97374 ca50f5 40 API calls 97374->97380 97376 ce3d45 97375->97376 97377 ca50f5 40 API calls 97376->97377 97379 ca506e messages 97377->97379 97379->97289 97380->97373 97380->97374 97380->97379 97466 ca511f 97380->97466 97382 ca5107 97381->97382 97383 ce3d70 97381->97383 97493 cce8c4 97382->97493 97386 d128fe 97635 d1274e 97386->97635 97388 d12919 97388->97296 97392 cce536 __FrameHandler3::FrameUnwindToState 97389->97392 97390 cce544 97414 ccf2d9 20 API calls __dosmaperr 97390->97414 97392->97390 97393 cce574 97392->97393 97395 cce579 97393->97395 97396 cce586 97393->97396 97394 cce549 97415 cd27ec 26 API calls __cftof 97394->97415 97416 ccf2d9 20 API calls __dosmaperr 97395->97416 97406 cd8061 97396->97406 97400 cce58f 97401 cce595 97400->97401 97402 cce5a2 97400->97402 97417 ccf2d9 20 API calls __dosmaperr 97401->97417 97418 cce5d4 LeaveCriticalSection __fread_nolock 97402->97418 97403 cce554 __fread_nolock 97403->97358 97407 cd806d __FrameHandler3::FrameUnwindToState 97406->97407 97419 cd2f5e EnterCriticalSection 97407->97419 97409 cd807b 97420 cd80fb 97409->97420 97413 cd80ac __fread_nolock 97413->97400 97414->97394 97415->97403 97416->97403 97417->97403 97418->97403 97419->97409 97427 cd811e 97420->97427 97421 cd8088 97433 cd80b7 97421->97433 97422 cd8177 97438 cd4c7d 97422->97438 97427->97421 97427->97422 97436 cc918d EnterCriticalSection 97427->97436 97437 cc91a1 LeaveCriticalSection 97427->97437 97428 cd8189 97428->97421 97451 cd3405 11 API calls 2 library calls 97428->97451 97430 cd81a8 97452 cc918d EnterCriticalSection 97430->97452 97456 cd2fa6 LeaveCriticalSection 97433->97456 97435 cd80be 97435->97413 97436->97427 97437->97427 97443 cd4c8a pre_c_initialization 97438->97443 97439 cd4cca 97454 ccf2d9 20 API calls __dosmaperr 97439->97454 97440 cd4cb5 RtlAllocateHeap 97441 cd4cc8 97440->97441 97440->97443 97445 cd29c8 97441->97445 97443->97439 97443->97440 97453 cc4ead 7 API calls 2 library calls 97443->97453 97446 cd29fc _free 97445->97446 97447 cd29d3 RtlFreeHeap 97445->97447 97446->97428 97447->97446 97448 cd29e8 97447->97448 97455 ccf2d9 20 API calls __dosmaperr 97448->97455 97450 cd29ee GetLastError 97450->97446 97451->97430 97452->97421 97453->97443 97454->97441 97455->97450 97456->97435 97458 cbfddb 22 API calls 97457->97458 97459 ca5734 97458->97459 97459->97368 97461 ca42bc FindResourceExW 97460->97461 97465 ca42d9 97460->97465 97462 ce35ba LoadResource 97461->97462 97461->97465 97463 ce35cf SizeofResource 97462->97463 97462->97465 97464 ce35e3 LockResource 97463->97464 97463->97465 97464->97465 97465->97380 97467 ca512e 97466->97467 97468 ce3d90 97466->97468 97472 ccece3 97467->97472 97471->97373 97475 cceaaa 97472->97475 97474 ca513c 97474->97380 97478 cceab6 __FrameHandler3::FrameUnwindToState 97475->97478 97476 cceac2 97488 ccf2d9 20 API calls __dosmaperr 97476->97488 97478->97476 97479 cceae8 97478->97479 97490 cc918d EnterCriticalSection 97479->97490 97480 cceac7 97489 cd27ec 26 API calls __cftof 97480->97489 97483 cceaf4 97491 ccec0a 62 API calls 2 library calls 97483->97491 97485 ccead2 __fread_nolock 97485->97474 97486 cceb08 97492 cceb27 LeaveCriticalSection __fread_nolock 97486->97492 97488->97480 97489->97485 97490->97483 97491->97486 97492->97485 97496 cce8e1 97493->97496 97495 ca5118 97495->97386 97497 cce8ed __FrameHandler3::FrameUnwindToState 97496->97497 97498 cce92d 97497->97498 97499 cce925 __fread_nolock 97497->97499 97503 cce900 ___scrt_fastfail 97497->97503 97509 cc918d EnterCriticalSection 97498->97509 97499->97495 97502 cce937 97510 cce6f8 97502->97510 97523 ccf2d9 20 API calls __dosmaperr 97503->97523 97504 cce91a 97524 cd27ec 26 API calls __cftof 97504->97524 97509->97502 97513 cce70a ___scrt_fastfail 97510->97513 97516 cce727 97510->97516 97511 cce717 97598 ccf2d9 20 API calls __dosmaperr 97511->97598 97513->97511 97513->97516 97521 cce76a __fread_nolock 97513->97521 97514 cce71c 97599 cd27ec 26 API calls __cftof 97514->97599 97525 cce96c LeaveCriticalSection __fread_nolock 97516->97525 97517 cce886 ___scrt_fastfail 97601 ccf2d9 20 API calls __dosmaperr 97517->97601 97521->97516 97521->97517 97526 ccd955 97521->97526 97533 cd8d45 97521->97533 97600 cccf78 26 API calls 4 library calls 97521->97600 97523->97504 97524->97499 97525->97499 97527 ccd976 97526->97527 97528 ccd961 97526->97528 97527->97521 97602 ccf2d9 20 API calls __dosmaperr 97528->97602 97530 ccd966 97603 cd27ec 26 API calls __cftof 97530->97603 97532 ccd971 97532->97521 97534 cd8d57 97533->97534 97537 cd8d6f 97533->97537 97613 ccf2c6 20 API calls __dosmaperr 97534->97613 97536 cd90d9 97629 ccf2c6 20 API calls __dosmaperr 97536->97629 97537->97536 97542 cd8db4 97537->97542 97538 cd8d5c 97614 ccf2d9 20 API calls __dosmaperr 97538->97614 97541 cd90de 97630 ccf2d9 20 API calls __dosmaperr 97541->97630 97544 cd8dbf 97542->97544 97545 cd8d64 97542->97545 97550 cd8def 97542->97550 97615 ccf2c6 20 API calls __dosmaperr 97544->97615 97545->97521 97546 cd8dcc 97631 cd27ec 26 API calls __cftof 97546->97631 97548 cd8dc4 97616 ccf2d9 20 API calls __dosmaperr 97548->97616 97552 cd8e08 97550->97552 97553 cd8e2e 97550->97553 97554 cd8e4a 97550->97554 97552->97553 97558 cd8e15 97552->97558 97617 ccf2c6 20 API calls __dosmaperr 97553->97617 97620 cd3820 21 API calls 2 library calls 97554->97620 97557 cd8e33 97618 ccf2d9 20 API calls __dosmaperr 97557->97618 97604 cdf89b 97558->97604 97559 cd8e61 97562 cd29c8 _free 20 API calls 97559->97562 97565 cd8e6a 97562->97565 97563 cd8fb3 97566 cd9029 97563->97566 97568 cd8fcc GetConsoleMode 97563->97568 97564 cd8e3a 97619 cd27ec 26 API calls __cftof 97564->97619 97569 cd29c8 _free 20 API calls 97565->97569 97570 cd902d ReadFile 97566->97570 97568->97566 97571 cd8fdd 97568->97571 97572 cd8e71 97569->97572 97573 cd9047 97570->97573 97574 cd90a1 GetLastError 97570->97574 97571->97570 97575 cd8fe3 ReadConsoleW 97571->97575 97576 cd8e7b 97572->97576 97577 cd8e96 97572->97577 97573->97574 97580 cd901e 97573->97580 97578 cd90ae 97574->97578 97579 cd9005 97574->97579 97575->97580 97582 cd8fff GetLastError 97575->97582 97621 ccf2d9 20 API calls __dosmaperr 97576->97621 97623 cd9424 28 API calls __wsopen_s 97577->97623 97627 ccf2d9 20 API calls __dosmaperr 97578->97627 97595 cd8e45 __fread_nolock 97579->97595 97624 ccf2a3 20 API calls 2 library calls 97579->97624 97590 cd906c 97580->97590 97591 cd9083 97580->97591 97580->97595 97582->97579 97583 cd29c8 _free 20 API calls 97583->97545 97586 cd90b3 97628 ccf2c6 20 API calls __dosmaperr 97586->97628 97588 cd8e80 97622 ccf2c6 20 API calls __dosmaperr 97588->97622 97625 cd8a61 31 API calls 4 library calls 97590->97625 97594 cd909a 97591->97594 97591->97595 97626 cd88a1 29 API calls __wsopen_s 97594->97626 97595->97583 97597 cd909f 97597->97595 97598->97514 97599->97516 97600->97521 97601->97514 97602->97530 97603->97532 97605 cdf8a8 97604->97605 97606 cdf8b5 97604->97606 97632 ccf2d9 20 API calls __dosmaperr 97605->97632 97609 cdf8c1 97606->97609 97633 ccf2d9 20 API calls __dosmaperr 97606->97633 97608 cdf8ad 97608->97563 97609->97563 97611 cdf8e2 97634 cd27ec 26 API calls __cftof 97611->97634 97613->97538 97614->97545 97615->97548 97616->97546 97617->97557 97618->97564 97619->97595 97620->97559 97621->97588 97622->97595 97623->97558 97624->97595 97625->97595 97626->97597 97627->97586 97628->97595 97629->97541 97630->97546 97631->97545 97632->97608 97633->97611 97634->97608 97638 cce4e8 97635->97638 97637 d1275d 97637->97388 97641 cce469 97638->97641 97640 cce505 97640->97637 97642 cce48c 97641->97642 97643 cce478 97641->97643 97648 cce488 __alldvrm 97642->97648 97651 cd333f 11 API calls 2 library calls 97642->97651 97649 ccf2d9 20 API calls __dosmaperr 97643->97649 97645 cce47d 97650 cd27ec 26 API calls __cftof 97645->97650 97648->97640 97649->97645 97650->97648 97651->97648 97653 d12e7a 97652->97653 97654 ca50f5 40 API calls 97653->97654 97655 d12d3b 97653->97655 97656 d128fe 27 API calls 97653->97656 97657 ca511f 64 API calls 97653->97657 97654->97653 97655->97303 97655->97304 97656->97653 97657->97653 97659 d122d9 97658->97659 97660 d122e7 97658->97660 97661 cce5eb 29 API calls 97659->97661 97662 d1232c 97660->97662 97663 cce5eb 29 API calls 97660->97663 97686 d122f0 97660->97686 97661->97660 97687 d12557 97662->97687 97664 d12311 97663->97664 97664->97662 97666 d1231a 97664->97666 97670 cce678 67 API calls 97666->97670 97666->97686 97667 d12370 97668 d12395 97667->97668 97669 d12374 97667->97669 97691 d12171 97668->97691 97672 d12381 97669->97672 97673 cce678 67 API calls 97669->97673 97670->97686 97675 cce678 67 API calls 97672->97675 97672->97686 97673->97672 97674 d1239d 97676 d123c3 97674->97676 97677 d123a3 97674->97677 97675->97686 97698 d123f3 97676->97698 97679 d123b0 97677->97679 97680 cce678 67 API calls 97677->97680 97681 cce678 67 API calls 97679->97681 97679->97686 97680->97679 97681->97686 97682 d123ca 97683 d123de 97682->97683 97706 cce678 97682->97706 97685 cce678 67 API calls 97683->97685 97683->97686 97685->97686 97686->97303 97688 d1257c 97687->97688 97690 d12565 __fread_nolock 97687->97690 97689 cce8c4 __fread_nolock 40 API calls 97688->97689 97689->97690 97690->97667 97692 ccea0c ___std_exception_copy 21 API calls 97691->97692 97693 d1217f 97692->97693 97694 ccea0c ___std_exception_copy 21 API calls 97693->97694 97695 d12190 97694->97695 97696 ccea0c ___std_exception_copy 21 API calls 97695->97696 97697 d1219c 97696->97697 97697->97674 97702 d12408 97698->97702 97699 d124c0 97723 d12724 97699->97723 97701 d121cc 40 API calls 97701->97702 97702->97699 97702->97701 97705 d124c7 97702->97705 97719 d12606 97702->97719 97727 d12269 40 API calls 97702->97727 97705->97682 97707 cce684 __FrameHandler3::FrameUnwindToState 97706->97707 97708 cce6aa 97707->97708 97709 cce695 97707->97709 97711 cce6a5 __fread_nolock 97708->97711 97763 cc918d EnterCriticalSection 97708->97763 97780 ccf2d9 20 API calls __dosmaperr 97709->97780 97711->97683 97712 cce69a 97781 cd27ec 26 API calls __cftof 97712->97781 97714 cce6c6 97764 cce602 97714->97764 97717 cce6d1 97782 cce6ee LeaveCriticalSection __fread_nolock 97717->97782 97720 d1261d 97719->97720 97722 d12617 97719->97722 97720->97702 97720->97720 97722->97720 97728 d126d7 97722->97728 97724 d12731 97723->97724 97725 d12742 97723->97725 97726 ccdbb3 65 API calls 97724->97726 97725->97705 97726->97725 97727->97702 97729 d12703 97728->97729 97730 d12714 97728->97730 97732 ccdbb3 97729->97732 97730->97722 97733 ccdbc1 97732->97733 97739 ccdbdd 97732->97739 97734 ccdbcd 97733->97734 97735 ccdbe3 97733->97735 97733->97739 97744 ccf2d9 20 API calls __dosmaperr 97734->97744 97741 ccd9cc 97735->97741 97738 ccdbd2 97745 cd27ec 26 API calls __cftof 97738->97745 97739->97730 97746 ccd97b 97741->97746 97744->97738 97745->97739 97747 ccd987 __FrameHandler3::FrameUnwindToState 97746->97747 97754 cc918d EnterCriticalSection 97747->97754 97749 ccd995 97755 ccd9f4 97749->97755 97754->97749 97756 cd49a1 27 API calls 97755->97756 97757 ccda09 97756->97757 97758 ccda3a 62 API calls 97757->97758 97759 ccda24 97758->97759 97763->97714 97765 cce60f 97764->97765 97766 cce624 97764->97766 97808 ccf2d9 20 API calls __dosmaperr 97765->97808 97773 cce61f 97766->97773 97783 ccdc0b 97766->97783 97768 cce614 97809 cd27ec 26 API calls __cftof 97768->97809 97773->97717 97775 ccd955 __fread_nolock 26 API calls 97776 cce646 97775->97776 97793 cd862f 97776->97793 97780->97712 97781->97711 97782->97711 97784 ccdc23 97783->97784 97788 ccdc1f 97783->97788 97785 ccd955 __fread_nolock 26 API calls 97784->97785 97784->97788 97786 ccdc43 97785->97786 97810 cd59be 97786->97810 97789 cd4d7a 97788->97789 97790 cce640 97789->97790 97791 cd4d90 97789->97791 97790->97775 97791->97790 97792 cd29c8 _free 20 API calls 97791->97792 97792->97790 97794 cd863e 97793->97794 97797 cd8653 97793->97797 97808->97768 97809->97773 97811 cd59ca __FrameHandler3::FrameUnwindToState 97810->97811 97812 cd59d2 97811->97812 97816 cd59ea 97811->97816 97889 ccf2c6 20 API calls __dosmaperr 97812->97889 97813 cd5a88 97816->97813 97820 cd5a1f 97816->97820 97817 cd59d7 97889->97817 97982->97198 97983 ce2ba5 97984 ce2baf 97983->97984 97985 ca2b25 97983->97985 98026 ca3a5a 97984->98026 98011 ca2b83 7 API calls 97985->98011 97989 ce2bb8 98033 ca9cb3 97989->98033 97992 ca2b2f 97996 ca2b44 97992->97996 98015 ca3837 97992->98015 97993 ce2bc6 97994 ce2bce 97993->97994 97995 ce2bf5 97993->97995 98039 ca33c6 97994->98039 97998 ca33c6 22 API calls 97995->97998 98002 ca2b5f 97996->98002 98025 ca30f2 Shell_NotifyIconW ___scrt_fastfail 97996->98025 98009 ce2bf1 GetForegroundWindow ShellExecuteW 97998->98009 98008 ca2b66 SetCurrentDirectoryW 98002->98008 98006 ce2c26 98006->98002 98007 ca33c6 22 API calls 98007->98009 98010 ca2b7a 98008->98010 98009->98006 98057 ca2cd4 7 API calls 98011->98057 98013 ca2b2a 98014 ca2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98013->98014 98014->97992 98016 ca3862 ___scrt_fastfail 98015->98016 98058 ca4212 98016->98058 98019 ca38e8 98021 ce3386 Shell_NotifyIconW 98019->98021 98022 ca3906 Shell_NotifyIconW 98019->98022 98062 ca3923 98022->98062 98024 ca391c 98024->97996 98025->98002 98027 ce1f50 __wsopen_s 98026->98027 98028 ca3a67 GetModuleFileNameW 98027->98028 98029 ca9cb3 22 API calls 98028->98029 98030 ca3a8d 98029->98030 98031 ca3aa2 23 API calls 98030->98031 98032 ca3a97 98031->98032 98032->97989 98034 ca9cc2 _wcslen 98033->98034 98035 cbfe0b 22 API calls 98034->98035 98036 ca9cea __fread_nolock 98035->98036 98037 cbfddb 22 API calls 98036->98037 98038 ca9d00 98037->98038 98038->97993 98040 ce30bb 98039->98040 98041 ca33dd 98039->98041 98042 cbfddb 22 API calls 98040->98042 98094 ca33ee 98041->98094 98045 ce30c5 _wcslen 98042->98045 98044 ca33e8 98048 ca6350 98044->98048 98046 cbfe0b 22 API calls 98045->98046 98047 ce30fe __fread_nolock 98046->98047 98049 ca6362 98048->98049 98050 ce4a51 98048->98050 98109 ca6373 98049->98109 98119 ca4a88 22 API calls __fread_nolock 98050->98119 98053 ca636e 98053->98007 98054 ce4a5b 98055 ce4a67 98054->98055 98056 caa8c7 22 API calls 98054->98056 98056->98055 98057->98013 98059 ce35a4 98058->98059 98060 ca38b7 98058->98060 98059->98060 98061 ce35ad DestroyIcon 98059->98061 98060->98019 98084 d0c874 42 API calls _strftime 98060->98084 98061->98060 98063 ca393f 98062->98063 98064 ca3a13 98062->98064 98085 ca6270 98063->98085 98064->98024 98067 ca395a 98069 ca6b57 22 API calls 98067->98069 98068 ce3393 LoadStringW 98070 ce33ad 98068->98070 98071 ca396f 98069->98071 98078 ca3994 ___scrt_fastfail 98070->98078 98090 caa8c7 98070->98090 98072 ca397c 98071->98072 98073 ce33c9 98071->98073 98072->98070 98075 ca3986 98072->98075 98076 ca6350 22 API calls 98073->98076 98077 ca6350 22 API calls 98075->98077 98079 ce33d7 98076->98079 98077->98078 98081 ca39f9 Shell_NotifyIconW 98078->98081 98079->98078 98080 ca33c6 22 API calls 98079->98080 98082 ce33f9 98080->98082 98081->98064 98083 ca33c6 22 API calls 98082->98083 98083->98078 98084->98019 98086 cbfe0b 22 API calls 98085->98086 98087 ca6295 98086->98087 98088 cbfddb 22 API calls 98087->98088 98089 ca394d 98088->98089 98089->98067 98089->98068 98091 caa8ea __fread_nolock 98090->98091 98092 caa8db 98090->98092 98091->98078 98092->98091 98093 cbfe0b 22 API calls 98092->98093 98093->98091 98095 ca33fe _wcslen 98094->98095 98096 ce311d 98095->98096 98097 ca3411 98095->98097 98099 cbfddb 22 API calls 98096->98099 98104 caa587 98097->98104 98101 ce3127 98099->98101 98100 ca341e __fread_nolock 98100->98044 98102 cbfe0b 22 API calls 98101->98102 98103 ce3157 __fread_nolock 98102->98103 98105 caa59d 98104->98105 98108 caa598 __fread_nolock 98104->98108 98106 cef80f 98105->98106 98107 cbfe0b 22 API calls 98105->98107 98107->98108 98108->98100 98110 ca63b6 __fread_nolock 98109->98110 98111 ca6382 98109->98111 98110->98053 98111->98110 98112 ca63a9 98111->98112 98113 ce4a82 98111->98113 98115 caa587 22 API calls 98112->98115 98114 cbfddb 22 API calls 98113->98114 98116 ce4a91 98114->98116 98115->98110 98117 cbfe0b 22 API calls 98116->98117 98118 ce4ac5 __fread_nolock 98117->98118 98119->98054 98120 ca1044 98125 ca10f3 98120->98125 98122 ca104a 98161 cc00a3 29 API calls __onexit 98122->98161 98124 ca1054 98162 ca1398 98125->98162 98129 ca116a 98130 caa961 22 API calls 98129->98130 98131 ca1174 98130->98131 98132 caa961 22 API calls 98131->98132 98133 ca117e 98132->98133 98134 caa961 22 API calls 98133->98134 98135 ca1188 98134->98135 98136 caa961 22 API calls 98135->98136 98137 ca11c6 98136->98137 98138 caa961 22 API calls 98137->98138 98139 ca1292 98138->98139 98172 ca171c 98139->98172 98143 ca12c4 98144 caa961 22 API calls 98143->98144 98145 ca12ce 98144->98145 98193 cb1940 98145->98193 98147 ca12f9 98203 ca1aab 98147->98203 98149 ca1315 98150 ca1325 GetStdHandle 98149->98150 98151 ca137a 98150->98151 98152 ce2485 98150->98152 98155 ca1387 OleInitialize 98151->98155 98152->98151 98153 ce248e 98152->98153 98154 cbfddb 22 API calls 98153->98154 98156 ce2495 98154->98156 98155->98122 98210 d1011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 98156->98210 98158 ce249e 98211 d10944 CreateThread 98158->98211 98160 ce24aa CloseHandle 98160->98151 98161->98124 98212 ca13f1 98162->98212 98165 ca13f1 22 API calls 98166 ca13d0 98165->98166 98167 caa961 22 API calls 98166->98167 98168 ca13dc 98167->98168 98169 ca6b57 22 API calls 98168->98169 98170 ca1129 98169->98170 98171 ca1bc3 6 API calls 98170->98171 98171->98129 98173 caa961 22 API calls 98172->98173 98174 ca172c 98173->98174 98175 caa961 22 API calls 98174->98175 98176 ca1734 98175->98176 98177 caa961 22 API calls 98176->98177 98178 ca174f 98177->98178 98179 cbfddb 22 API calls 98178->98179 98180 ca129c 98179->98180 98181 ca1b4a 98180->98181 98182 ca1b58 98181->98182 98183 caa961 22 API calls 98182->98183 98184 ca1b63 98183->98184 98185 caa961 22 API calls 98184->98185 98186 ca1b6e 98185->98186 98187 caa961 22 API calls 98186->98187 98188 ca1b79 98187->98188 98189 caa961 22 API calls 98188->98189 98190 ca1b84 98189->98190 98191 cbfddb 22 API calls 98190->98191 98192 ca1b96 RegisterWindowMessageW 98191->98192 98192->98143 98194 cb195d 98193->98194 98195 cb1981 98193->98195 98202 cb196e 98194->98202 98221 cc0242 5 API calls __Init_thread_wait 98194->98221 98219 cc0242 5 API calls __Init_thread_wait 98195->98219 98197 cb198b 98197->98194 98220 cc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98197->98220 98199 cb8727 98199->98202 98222 cc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98199->98222 98202->98147 98204 ca1abb 98203->98204 98205 ce272d 98203->98205 98206 cbfddb 22 API calls 98204->98206 98223 d13209 23 API calls 98205->98223 98209 ca1ac3 98206->98209 98208 ce2738 98209->98149 98210->98158 98211->98160 98224 d1092a 28 API calls 98211->98224 98213 caa961 22 API calls 98212->98213 98214 ca13fc 98213->98214 98215 caa961 22 API calls 98214->98215 98216 ca1404 98215->98216 98217 caa961 22 API calls 98216->98217 98218 ca13c6 98217->98218 98218->98165 98219->98197 98220->98194 98221->98199 98222->98202 98223->98208 98225 cf2a00 98240 cad7b0 messages 98225->98240 98226 cadb11 PeekMessageW 98226->98240 98227 cad807 GetInputState 98227->98226 98227->98240 98228 cf1cbe TranslateAcceleratorW 98228->98240 98230 cadb8f PeekMessageW 98230->98240 98231 cada04 timeGetTime 98231->98240 98232 cadb73 TranslateMessage DispatchMessageW 98232->98230 98233 cadbaf Sleep 98247 cadbc0 98233->98247 98234 cf2b74 Sleep 98234->98247 98235 cbe551 timeGetTime 98235->98247 98236 cf1dda timeGetTime 98397 cbe300 23 API calls 98236->98397 98239 cf2c0b GetExitCodeProcess 98243 cf2c37 CloseHandle 98239->98243 98244 cf2c21 WaitForSingleObject 98239->98244 98240->98226 98240->98227 98240->98228 98240->98230 98240->98231 98240->98232 98240->98233 98240->98234 98240->98236 98246 cad9d5 98240->98246 98257 cadfd0 98240->98257 98280 cb1310 98240->98280 98337 cabf40 98240->98337 98395 cadd50 256 API calls 98240->98395 98396 cbedf6 IsDialogMessageW GetClassLongW 98240->98396 98398 d13a2a 23 API calls 98240->98398 98399 caec40 98240->98399 98423 d1359c 82 API calls __wsopen_s 98240->98423 98241 d329bf GetForegroundWindow 98241->98247 98243->98247 98244->98240 98244->98243 98245 cf2a31 98245->98246 98247->98235 98247->98239 98247->98240 98247->98241 98247->98245 98247->98246 98248 cf2ca9 Sleep 98247->98248 98424 d25658 23 API calls 98247->98424 98425 d0e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98247->98425 98426 d0d4dc 47 API calls 98247->98426 98248->98240 98258 cae010 98257->98258 98277 cae0dc messages 98258->98277 98429 cc0242 5 API calls __Init_thread_wait 98258->98429 98261 cf2fca 98263 caa961 22 API calls 98261->98263 98261->98277 98262 caa961 22 API calls 98262->98277 98264 cf2fe4 98263->98264 98430 cc00a3 29 API calls __onexit 98264->98430 98268 cf2fee 98431 cc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98268->98431 98271 caec40 256 API calls 98271->98277 98272 d1359c 82 API calls 98272->98277 98274 caa8c7 22 API calls 98274->98277 98275 cb04f0 22 API calls 98275->98277 98276 cae3e1 98276->98240 98277->98262 98277->98271 98277->98272 98277->98274 98277->98275 98277->98276 98427 caa81b 41 API calls 98277->98427 98428 cba308 256 API calls 98277->98428 98432 cc0242 5 API calls __Init_thread_wait 98277->98432 98433 cc00a3 29 API calls __onexit 98277->98433 98434 cc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98277->98434 98435 d247d4 256 API calls 98277->98435 98436 d268c1 256 API calls 98277->98436 98281 cb17b0 98280->98281 98282 cb1376 98280->98282 98650 cc0242 5 API calls __Init_thread_wait 98281->98650 98283 cb1390 98282->98283 98284 cf6331 98282->98284 98287 cb1940 9 API calls 98283->98287 98288 cf633d 98284->98288 98655 d2709c 256 API calls 98284->98655 98286 cb17ba 98290 cb17fb 98286->98290 98292 ca9cb3 22 API calls 98286->98292 98291 cb13a0 98287->98291 98288->98240 98295 cf6346 98290->98295 98297 cb182c 98290->98297 98293 cb1940 9 API calls 98291->98293 98301 cb17d4 98292->98301 98294 cb13b6 98293->98294 98294->98290 98296 cb13ec 98294->98296 98656 d1359c 82 API calls __wsopen_s 98295->98656 98296->98295 98320 cb1408 __fread_nolock 98296->98320 98652 caaceb 23 API calls messages 98297->98652 98300 cb1839 98653 cbd217 256 API calls 98300->98653 98651 cc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98301->98651 98304 cf636e 98657 d1359c 82 API calls __wsopen_s 98304->98657 98305 cb152f 98307 cb153c 98305->98307 98308 cf63d1 98305->98308 98310 cb1940 9 API calls 98307->98310 98659 d25745 54 API calls _wcslen 98308->98659 98312 cb1549 98310->98312 98311 cbfddb 22 API calls 98311->98320 98317 cb1940 9 API calls 98312->98317 98327 cb15c7 messages 98312->98327 98313 cb1872 98654 cbfaeb 23 API calls 98313->98654 98314 cbfe0b 22 API calls 98314->98320 98315 cb171d 98315->98240 98325 cb1563 98317->98325 98319 caec40 256 API calls 98319->98320 98320->98300 98320->98304 98320->98305 98320->98311 98320->98314 98320->98319 98322 cf63b2 98320->98322 98320->98327 98321 cb167b messages 98321->98315 98649 cbce17 22 API calls messages 98321->98649 98658 d1359c 82 API calls __wsopen_s 98322->98658 98323 cb1940 9 API calls 98323->98327 98325->98327 98328 caa8c7 22 API calls 98325->98328 98327->98313 98327->98321 98327->98323 98331 ca4f39 68 API calls 98327->98331 98437 cbeffa 98327->98437 98494 d1744a 98327->98494 98551 d2958b 98327->98551 98554 d2959f 98327->98554 98557 d1f0ec 98327->98557 98566 d0d4ce 98327->98566 98569 d16ef1 98327->98569 98660 d1359c 82 API calls __wsopen_s 98327->98660 98328->98327 98331->98327 99129 caadf0 98337->99129 98339 cabf9d 98340 cabfa9 98339->98340 98341 cf04b6 98339->98341 98342 cf04c6 98340->98342 98343 cac01e 98340->98343 99148 d1359c 82 API calls __wsopen_s 98341->99148 99149 d1359c 82 API calls __wsopen_s 98342->99149 99134 caac91 98343->99134 98347 d07120 22 API calls 98364 cac039 __fread_nolock messages 98347->98364 98348 cac7da 98352 cbfe0b 22 API calls 98348->98352 98357 cac808 __fread_nolock 98352->98357 98354 cf04f5 98358 cf055a 98354->98358 99150 cbd217 256 API calls 98354->99150 98361 cbfe0b 22 API calls 98357->98361 98378 cac603 98358->98378 99151 d1359c 82 API calls __wsopen_s 98358->99151 98359 caaf8a 22 API calls 98359->98364 98360 cf091a 99161 d13209 23 API calls 98360->99161 98365 cac350 __fread_nolock messages 98361->98365 98364->98347 98364->98348 98364->98354 98364->98357 98364->98358 98364->98359 98364->98360 98366 caec40 256 API calls 98364->98366 98367 cf08a5 98364->98367 98369 cac237 98364->98369 98372 cf0591 98364->98372 98373 cf08f6 98364->98373 98364->98378 98379 cbfddb 22 API calls 98364->98379 98382 cbfe0b 22 API calls 98364->98382 98389 cf09bf 98364->98389 98392 cabbe0 40 API calls 98364->98392 99138 caad81 98364->99138 99153 d07099 22 API calls __fread_nolock 98364->99153 99154 d25745 54 API calls _wcslen 98364->99154 99155 cbaa42 22 API calls messages 98364->99155 99156 d0f05c 40 API calls 98364->99156 99157 caa993 41 API calls 98364->99157 99158 caaceb 23 API calls messages 98364->99158 98394 cac3ac 98365->98394 99147 cbce17 22 API calls messages 98365->99147 98366->98364 98368 caec40 256 API calls 98367->98368 98371 cf08cf 98368->98371 98381 cac253 98369->98381 98383 caa8c7 22 API calls 98369->98383 98371->98378 99159 caa81b 41 API calls 98371->99159 99152 d1359c 82 API calls __wsopen_s 98372->99152 99160 d1359c 82 API calls __wsopen_s 98373->99160 98378->98240 98379->98364 98384 cf0976 98381->98384 98387 cac297 messages 98381->98387 98382->98364 98383->98381 99162 caaceb 23 API calls messages 98384->99162 98387->98389 99145 caaceb 23 API calls messages 98387->99145 98389->98378 99163 d1359c 82 API calls __wsopen_s 98389->99163 98390 cac335 98390->98389 98391 cac342 98390->98391 99146 caa704 22 API calls messages 98391->99146 98392->98364 98394->98240 98395->98240 98396->98240 98397->98240 98398->98240 98405 caec76 messages 98399->98405 98400 cf4beb 99177 d1359c 82 API calls __wsopen_s 98400->99177 98401 cbfddb 22 API calls 98401->98405 98402 cafef7 98409 caa8c7 22 API calls 98402->98409 98415 caed9d messages 98402->98415 98405->98400 98405->98401 98405->98402 98406 cf4600 98405->98406 98407 cf4b0b 98405->98407 98408 caa8c7 22 API calls 98405->98408 98414 cc0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98405->98414 98405->98415 98416 cafbe3 98405->98416 98417 caa961 22 API calls 98405->98417 98420 cc00a3 29 API calls pre_c_initialization 98405->98420 98421 cc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98405->98421 98422 caf3ae messages 98405->98422 99172 cb01e0 256 API calls 2 library calls 98405->99172 99173 cb06a0 41 API calls messages 98405->99173 98412 caa8c7 22 API calls 98406->98412 98406->98415 99175 d1359c 82 API calls __wsopen_s 98407->99175 98408->98405 98409->98415 98412->98415 98414->98405 98415->98240 98416->98415 98418 cf4bdc 98416->98418 98416->98422 98417->98405 99176 d1359c 82 API calls __wsopen_s 98418->99176 98420->98405 98421->98405 98422->98415 99174 d1359c 82 API calls __wsopen_s 98422->99174 98423->98240 98424->98247 98425->98247 98426->98247 98427->98277 98428->98277 98429->98261 98430->98268 98431->98277 98432->98277 98433->98277 98434->98277 98435->98277 98436->98277 98661 ca9c6e 98437->98661 98440 cbfddb 22 API calls 98442 cbf02b 98440->98442 98444 cbfe0b 22 API calls 98442->98444 98443 cff0a8 98483 cbf0a4 98443->98483 98754 d19caa 39 API calls 98443->98754 98445 cbf03c 98444->98445 98699 ca6246 98445->98699 98449 cff10a 98452 cbf0b1 98449->98452 98453 cff112 98449->98453 98450 caa961 22 API calls 98451 cbf04f 98450->98451 98454 ca6246 CloseHandle 98451->98454 98675 cbfa5b 98452->98675 98456 cab567 39 API calls 98453->98456 98457 cbf056 98454->98457 98461 cbf0b8 98456->98461 98703 ca7510 98457->98703 98460 ca6246 CloseHandle 98462 cbf06c 98460->98462 98463 cff127 98461->98463 98464 cbf0d3 98461->98464 98726 ca5745 98462->98726 98467 cbfe0b 22 API calls 98463->98467 98466 ca6270 22 API calls 98464->98466 98469 cbf0db 98466->98469 98470 cff12c 98467->98470 98680 cbf141 98469->98680 98474 cff140 98470->98474 98755 cbf866 ReadFile SetFilePointerEx 98470->98755 98471 cbf085 98734 ca53de 98471->98734 98472 cff0a0 98753 ca6216 CloseHandle messages 98472->98753 98485 cff144 __fread_nolock 98474->98485 98756 d10e85 22 API calls ___scrt_fastfail 98474->98756 98477 cbf0ea 98477->98485 98750 ca62b5 22 API calls 98477->98750 98481 cbf093 98749 ca53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 98481->98749 98483->98452 98694 cab567 98483->98694 98484 cbf0fe 98486 cbf138 98484->98486 98489 ca6246 CloseHandle 98484->98489 98486->98327 98487 cff069 98752 d0ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 98487->98752 98488 cbf09a 98488->98483 98488->98487 98490 cbf12c 98489->98490 98490->98486 98751 ca6216 CloseHandle messages 98490->98751 98492 cff080 98492->98483 98495 d17469 98494->98495 98496 d17474 98494->98496 98497 cab567 39 API calls 98495->98497 98498 d17554 98496->98498 98500 caa961 22 API calls 98496->98500 98497->98496 98499 cbfddb 22 API calls 98498->98499 98539 d176a4 98498->98539 98501 d17587 98499->98501 98502 d17495 98500->98502 98503 cbfe0b 22 API calls 98501->98503 98504 caa961 22 API calls 98502->98504 98505 d17598 98503->98505 98507 d1749e 98504->98507 98506 ca6246 CloseHandle 98505->98506 98508 d175a3 98506->98508 98509 ca7510 53 API calls 98507->98509 98510 caa961 22 API calls 98508->98510 98511 d174aa 98509->98511 98512 d175ab 98510->98512 98813 ca525f 98511->98813 98514 ca6246 CloseHandle 98512->98514 98517 d175b2 98514->98517 98515 d174bf 98516 ca6350 22 API calls 98515->98516 98518 d174f2 98516->98518 98519 ca7510 53 API calls 98517->98519 98520 d1754a 98518->98520 98522 d0d4ce 4 API calls 98518->98522 98521 d175be 98519->98521 98524 cab567 39 API calls 98520->98524 98523 ca6246 CloseHandle 98521->98523 98525 d17502 98522->98525 98526 d175c8 98523->98526 98524->98498 98525->98520 98527 d17506 98525->98527 98529 ca5745 5 API calls 98526->98529 98528 ca9cb3 22 API calls 98527->98528 98530 d17513 98528->98530 98531 d175e2 98529->98531 98855 d0d2c1 26 API calls 98530->98855 98533 d175ea 98531->98533 98534 d176de GetLastError 98531->98534 98536 ca53de 27 API calls 98533->98536 98535 d176f7 98534->98535 98859 ca6216 CloseHandle messages 98535->98859 98538 d175f8 98536->98538 98856 ca53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 98538->98856 98539->98327 98540 d1751c 98540->98520 98542 d17645 98543 cbfddb 22 API calls 98542->98543 98546 d17679 98543->98546 98544 d175ff 98544->98542 98545 d17619 98544->98545 98857 d0ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 98545->98857 98547 caa961 22 API calls 98546->98547 98549 d17686 98547->98549 98549->98539 98858 d0417d 22 API calls __fread_nolock 98549->98858 98878 d27f59 98551->98878 98553 d2959b 98553->98327 98555 d27f59 120 API calls 98554->98555 98556 d295af 98555->98556 98556->98327 98558 ca7510 53 API calls 98557->98558 98559 d1f126 98558->98559 98970 ca9e90 98559->98970 98561 d1f136 98562 d1f15b 98561->98562 98563 caec40 256 API calls 98561->98563 98564 ca9c6e 22 API calls 98562->98564 98565 d1f15f 98562->98565 98563->98562 98564->98565 98565->98327 99005 d0dbbe lstrlenW 98566->99005 98570 caa961 22 API calls 98569->98570 98571 d16f1d 98570->98571 98572 caa961 22 API calls 98571->98572 98573 d16f26 98572->98573 98574 d16f3a 98573->98574 98575 cab567 39 API calls 98573->98575 98576 ca7510 53 API calls 98574->98576 98575->98574 98582 d16f57 _wcslen 98576->98582 98577 d16fbc 98580 ca7510 53 API calls 98577->98580 98578 d170bf 98579 ca4ecb 94 API calls 98578->98579 98581 d170d0 98579->98581 98583 d16fc8 98580->98583 98584 d170e5 98581->98584 98588 ca4ecb 94 API calls 98581->98588 98582->98577 98582->98578 98585 d170e9 98582->98585 98586 d16fdb 98583->98586 98587 caa8c7 22 API calls 98583->98587 98584->98585 98589 caa961 22 API calls 98584->98589 98585->98327 98592 d17027 98586->98592 98594 d17005 98586->98594 98597 caa8c7 22 API calls 98586->98597 98587->98586 98588->98584 98590 d1711a 98589->98590 98591 caa961 22 API calls 98590->98591 98593 d17126 98591->98593 98595 ca7510 53 API calls 98592->98595 98596 caa961 22 API calls 98593->98596 98598 ca33c6 22 API calls 98594->98598 98599 d17034 98595->98599 98602 d1712f 98596->98602 98597->98594 98603 d1700f 98598->98603 98600 d17047 98599->98600 98601 d1703d 98599->98601 99119 d0e199 GetFileAttributesW 98600->99119 98604 caa8c7 22 API calls 98601->98604 98606 caa961 22 API calls 98602->98606 98607 ca7510 53 API calls 98603->98607 98604->98600 98609 d17138 98606->98609 98610 d1701b 98607->98610 98608 d17050 98611 d17063 98608->98611 98614 ca4c6d 22 API calls 98608->98614 98612 ca7510 53 API calls 98609->98612 98613 ca6350 22 API calls 98610->98613 98616 ca7510 53 API calls 98611->98616 98621 d17069 98611->98621 98615 d17145 98612->98615 98613->98592 98614->98611 98617 ca525f 22 API calls 98615->98617 98618 d170a0 98616->98618 98619 d17166 98617->98619 99120 d0d076 57 API calls 98618->99120 98622 ca4c6d 22 API calls 98619->98622 98621->98585 98623 d17175 98622->98623 98624 d171a9 98623->98624 98626 ca4c6d 22 API calls 98623->98626 98625 caa8c7 22 API calls 98624->98625 98627 d171ba 98625->98627 98628 d17186 98626->98628 98629 ca6350 22 API calls 98627->98629 98628->98624 98630 ca6b57 22 API calls 98628->98630 98631 d171c8 98629->98631 98632 d1719b 98630->98632 98633 ca6350 22 API calls 98631->98633 98634 ca6b57 22 API calls 98632->98634 98635 d171d6 98633->98635 98634->98624 98636 ca6350 22 API calls 98635->98636 98637 d171e4 98636->98637 98638 ca7510 53 API calls 98637->98638 98639 d171f0 98638->98639 99010 d0d7bc 98639->99010 98641 d17201 98642 d0d4ce 4 API calls 98641->98642 98643 d1720b 98642->98643 98644 ca7510 53 API calls 98643->98644 98648 d17239 98643->98648 98645 d17229 98644->98645 99064 d12947 98645->99064 98647 ca4f39 68 API calls 98647->98585 98648->98647 98649->98321 98650->98286 98651->98290 98652->98300 98653->98313 98654->98313 98655->98288 98656->98327 98657->98327 98658->98327 98659->98325 98660->98327 98662 ca9c7e 98661->98662 98663 cef545 98661->98663 98667 cbfddb 22 API calls 98662->98667 98664 cef556 98663->98664 98665 ca6b57 22 API calls 98663->98665 98666 caa6c3 22 API calls 98664->98666 98665->98664 98668 cef560 98666->98668 98669 ca9c91 98667->98669 98668->98668 98670 ca9c9a 98669->98670 98671 ca9cac 98669->98671 98672 ca9cb3 22 API calls 98670->98672 98673 caa961 22 API calls 98671->98673 98674 ca9ca2 98672->98674 98673->98674 98674->98440 98674->98443 98757 ca54c6 98675->98757 98678 ca54c6 3 API calls 98679 cbfa9a 98678->98679 98679->98461 98681 cbf188 98680->98681 98682 cbf14c 98680->98682 98683 caa6c3 22 API calls 98681->98683 98682->98681 98684 cbf15b 98682->98684 98691 d0caeb 98683->98691 98686 cbf170 98684->98686 98688 cbf17d 98684->98688 98685 d0cb1a 98685->98477 98763 cbf18e 98686->98763 98770 d0cbf2 26 API calls 98688->98770 98691->98685 98771 d0ca89 ReadFile SetFilePointerEx 98691->98771 98772 ca49bd 22 API calls __fread_nolock 98691->98772 98692 cbf179 98692->98477 98695 cab57f 98694->98695 98696 cab578 98694->98696 98695->98449 98696->98695 98808 cc62d1 39 API calls _strftime 98696->98808 98698 cab5c2 98698->98449 98700 ca625f 98699->98700 98701 ca6250 98699->98701 98700->98701 98702 ca6264 CloseHandle 98700->98702 98701->98450 98702->98701 98704 ca7525 98703->98704 98720 ca7522 98703->98720 98705 ca755b 98704->98705 98706 ca752d 98704->98706 98709 ca756d 98705->98709 98714 ce500f 98705->98714 98717 ce50f6 98705->98717 98809 cc51c6 26 API calls 98706->98809 98810 cbfb21 51 API calls 98709->98810 98710 ce510e 98710->98710 98712 ca753d 98713 cbfddb 22 API calls 98712->98713 98716 ca7547 98713->98716 98719 cbfe0b 22 API calls 98714->98719 98725 ce5088 98714->98725 98718 ca9cb3 22 API calls 98716->98718 98812 cc5183 26 API calls 98717->98812 98718->98720 98721 ce5058 98719->98721 98720->98460 98722 cbfddb 22 API calls 98721->98722 98723 ce507f 98722->98723 98724 ca9cb3 22 API calls 98723->98724 98724->98725 98811 cbfb21 51 API calls 98725->98811 98727 ca575c CreateFileW 98726->98727 98728 ce4035 98726->98728 98730 ca577b 98727->98730 98729 ce403b CreateFileW 98728->98729 98728->98730 98729->98730 98731 ce4063 98729->98731 98730->98471 98730->98472 98732 ca54c6 3 API calls 98731->98732 98733 ce406e 98732->98733 98733->98730 98735 ca53f3 98734->98735 98748 ca53f0 messages 98734->98748 98736 ca54c6 3 API calls 98735->98736 98735->98748 98737 ca5410 98736->98737 98738 ce3f4b 98737->98738 98739 ca541d 98737->98739 98740 cbfa5b 3 API calls 98738->98740 98741 cbfe0b 22 API calls 98739->98741 98740->98748 98742 ca5429 98741->98742 98743 ca5722 22 API calls 98742->98743 98744 ca5433 98743->98744 98745 ca9a40 2 API calls 98744->98745 98746 ca543f 98745->98746 98747 ca54c6 3 API calls 98746->98747 98747->98748 98748->98481 98749->98488 98750->98484 98751->98486 98752->98492 98753->98443 98754->98443 98755->98474 98756->98485 98758 ca54dd 98757->98758 98759 ce3f9c SetFilePointerEx 98758->98759 98760 ca5564 SetFilePointerEx SetFilePointerEx 98758->98760 98761 ce3f8b 98758->98761 98762 ca5530 98758->98762 98760->98762 98761->98759 98762->98678 98773 cbf1d8 98763->98773 98768 cbf1c1 98768->98692 98770->98692 98771->98691 98772->98691 98774 cbfe0b 22 API calls 98773->98774 98775 cbf1ef 98774->98775 98776 cbfddb 22 API calls 98775->98776 98777 cbf1a6 98776->98777 98778 ca97b6 98777->98778 98792 ca9a1e 98778->98792 98780 ca97fc 98780->98768 98784 ca6e14 MultiByteToWideChar 98780->98784 98782 ca97c7 98782->98780 98799 ca9a40 98782->98799 98805 ca9b01 22 API calls __fread_nolock 98782->98805 98785 ca6e40 98784->98785 98786 ca6e87 98784->98786 98787 cbfe0b 22 API calls 98785->98787 98788 caa6c3 22 API calls 98786->98788 98790 ca6e55 MultiByteToWideChar 98787->98790 98789 ca6e7b 98788->98789 98789->98768 98807 ca6e90 22 API calls __fread_nolock 98790->98807 98793 ca9a2f 98792->98793 98794 cef378 98792->98794 98793->98782 98795 cbfddb 22 API calls 98794->98795 98796 cef382 98795->98796 98797 cbfe0b 22 API calls 98796->98797 98798 cef397 98797->98798 98800 ca9abb 98799->98800 98804 ca9a4e 98799->98804 98806 cbe40f SetFilePointerEx 98800->98806 98802 ca9a7c 98802->98782 98803 ca9a8c ReadFile 98803->98802 98803->98804 98804->98802 98804->98803 98805->98782 98806->98804 98807->98789 98808->98698 98809->98712 98810->98712 98811->98717 98812->98710 98814 caa961 22 API calls 98813->98814 98815 ca5275 98814->98815 98816 caa961 22 API calls 98815->98816 98817 ca527d 98816->98817 98818 caa961 22 API calls 98817->98818 98819 ca5285 98818->98819 98820 caa961 22 API calls 98819->98820 98821 ca528d 98820->98821 98822 ce3df5 98821->98822 98823 ca52c1 98821->98823 98824 caa8c7 22 API calls 98822->98824 98825 ca6d25 22 API calls 98823->98825 98826 ce3dfe 98824->98826 98827 ca52cf 98825->98827 98828 caa6c3 22 API calls 98826->98828 98829 ca93b2 22 API calls 98827->98829 98831 ca5304 98828->98831 98830 ca52d9 98829->98830 98830->98831 98833 ca6d25 22 API calls 98830->98833 98832 ca5349 98831->98832 98834 ca5325 98831->98834 98850 ce3e20 98831->98850 98860 ca6d25 98832->98860 98836 ca52fa 98833->98836 98834->98832 98873 ca4c6d 98834->98873 98838 ca93b2 22 API calls 98836->98838 98837 ca535a 98840 ca5370 98837->98840 98845 caa8c7 22 API calls 98837->98845 98838->98831 98841 ca5384 98840->98841 98846 caa8c7 22 API calls 98840->98846 98844 ca538f 98841->98844 98848 caa8c7 22 API calls 98841->98848 98843 ca6b57 22 API calls 98852 ce3ee0 98843->98852 98849 caa8c7 22 API calls 98844->98849 98854 ca539a 98844->98854 98845->98840 98846->98841 98847 ca6d25 22 API calls 98847->98832 98848->98844 98849->98854 98850->98843 98851 ca4c6d 22 API calls 98851->98852 98852->98832 98852->98851 98876 ca49bd 22 API calls __fread_nolock 98852->98876 98854->98515 98855->98540 98856->98544 98857->98542 98858->98539 98859->98539 98861 ca6d91 98860->98861 98862 ca6d34 98860->98862 98863 ca93b2 22 API calls 98861->98863 98862->98861 98864 ca6d3f 98862->98864 98870 ca6d62 __fread_nolock 98863->98870 98865 ca6d5a 98864->98865 98866 ce4c9d 98864->98866 98877 ca6f34 22 API calls 98865->98877 98867 cbfddb 22 API calls 98866->98867 98869 ce4ca7 98867->98869 98871 cbfe0b 22 API calls 98869->98871 98870->98837 98872 ce4cda 98871->98872 98874 caaec9 22 API calls 98873->98874 98875 ca4c78 98874->98875 98875->98832 98875->98847 98876->98852 98877->98870 98879 ca7510 53 API calls 98878->98879 98880 d27f90 98879->98880 98901 d27fd5 messages 98880->98901 98916 d28cd3 98880->98916 98882 d28281 98883 d2844f 98882->98883 98887 d2828f 98882->98887 98957 d28ee4 60 API calls 98883->98957 98886 d2845e 98886->98887 98888 d2846a 98886->98888 98929 d27e86 98887->98929 98888->98901 98889 ca7510 53 API calls 98905 d28049 98889->98905 98894 d282c8 98944 cbfc70 98894->98944 98897 d28302 98951 ca63eb 22 API calls 98897->98951 98898 d282e8 98950 d1359c 82 API calls __wsopen_s 98898->98950 98901->98553 98902 d282f3 GetCurrentProcess TerminateProcess 98902->98897 98903 d28311 98952 ca6a50 22 API calls 98903->98952 98905->98882 98905->98889 98905->98901 98948 d0417d 22 API calls __fread_nolock 98905->98948 98949 d2851d 42 API calls _strftime 98905->98949 98906 d2832a 98915 d28352 98906->98915 98953 cb04f0 22 API calls 98906->98953 98908 d284c5 98908->98901 98912 d284d9 FreeLibrary 98908->98912 98909 d28341 98954 d28b7b 75 API calls 98909->98954 98912->98901 98915->98908 98955 cb04f0 22 API calls 98915->98955 98956 caaceb 23 API calls messages 98915->98956 98958 d28b7b 75 API calls 98915->98958 98917 caaec9 22 API calls 98916->98917 98918 d28cee CharLowerBuffW 98917->98918 98959 d08e54 98918->98959 98922 caa961 22 API calls 98923 d28d2a 98922->98923 98924 ca6d25 22 API calls 98923->98924 98925 d28d3e 98924->98925 98926 ca93b2 22 API calls 98925->98926 98928 d28d48 _wcslen 98926->98928 98927 d28e5e _wcslen 98927->98905 98928->98927 98966 d2851d 42 API calls _strftime 98928->98966 98930 d27ea1 98929->98930 98934 d27eec 98929->98934 98931 cbfe0b 22 API calls 98930->98931 98932 d27ec3 98931->98932 98933 cbfddb 22 API calls 98932->98933 98932->98934 98933->98932 98935 d29096 98934->98935 98936 d292ab messages 98935->98936 98943 d290ba _strcat _wcslen 98935->98943 98936->98894 98937 cab38f 39 API calls 98937->98943 98938 cab567 39 API calls 98938->98943 98939 cab6b5 39 API calls 98939->98943 98940 ca7510 53 API calls 98940->98943 98941 ccea0c 21 API calls ___std_exception_copy 98941->98943 98943->98936 98943->98937 98943->98938 98943->98939 98943->98940 98943->98941 98969 d0efae 24 API calls _wcslen 98943->98969 98946 cbfc85 98944->98946 98945 cbfd1d VirtualAlloc 98947 cbfceb 98945->98947 98946->98945 98946->98947 98947->98897 98947->98898 98948->98905 98949->98905 98950->98902 98951->98903 98952->98906 98953->98909 98954->98915 98955->98915 98956->98915 98957->98886 98958->98915 98960 d08e74 _wcslen 98959->98960 98961 d08f63 98960->98961 98963 d08ea9 98960->98963 98965 d08f68 98960->98965 98961->98922 98961->98928 98963->98961 98967 cbce60 41 API calls 98963->98967 98965->98961 98968 cbce60 41 API calls 98965->98968 98966->98927 98967->98963 98968->98965 98969->98943 98971 ca6270 22 API calls 98970->98971 98997 ca9eb5 98971->98997 98972 ca9fd2 98973 caa4a1 22 API calls 98972->98973 98975 ca9fec 98973->98975 98975->98561 98977 caa6c3 22 API calls 98977->98997 98978 cef7c4 99003 d096e2 84 API calls __wsopen_s 98978->99003 98979 cef699 98984 cbfddb 22 API calls 98979->98984 98981 caa405 98981->98975 99004 d096e2 84 API calls __wsopen_s 98981->99004 98986 cef754 98984->98986 98985 cef7d2 98987 caa4a1 22 API calls 98985->98987 98989 cbfe0b 22 API calls 98986->98989 98988 cef7e8 98987->98988 98988->98975 98991 caa12c __fread_nolock 98989->98991 98991->98978 98991->98981 98992 caa587 22 API calls 98992->98997 98993 caaec9 22 API calls 98995 caa0db CharUpperBuffW 98993->98995 98994 caa4a1 22 API calls 98994->98997 98999 caa673 22 API calls 98995->98999 98997->98972 98997->98977 98997->98978 98997->98979 98997->98981 98997->98991 98997->98992 98997->98993 98997->98994 98998 ca4573 41 API calls _wcslen 98997->98998 99000 ca48c8 23 API calls 98997->99000 99001 ca49bd 22 API calls __fread_nolock 98997->99001 99002 caa673 22 API calls 98997->99002 98998->98997 98999->98997 99000->98997 99001->98997 99002->98997 99003->98985 99004->98975 99006 d0dbdc GetFileAttributesW 99005->99006 99007 d0d4d5 99005->99007 99006->99007 99008 d0dbe8 FindFirstFileW 99006->99008 99007->98327 99008->99007 99009 d0dbf9 FindClose 99008->99009 99009->99007 99011 d0d7d8 99010->99011 99012 d0d7f3 99011->99012 99013 d0d7dd 99011->99013 99015 caa961 22 API calls 99012->99015 99014 d0d7ee 99013->99014 99016 caa8c7 22 API calls 99013->99016 99014->98641 99017 d0d7fb 99015->99017 99016->99014 99018 caa961 22 API calls 99017->99018 99019 d0d803 99018->99019 99020 caa961 22 API calls 99019->99020 99021 d0d80e 99020->99021 99022 caa961 22 API calls 99021->99022 99023 d0d816 99022->99023 99024 caa961 22 API calls 99023->99024 99025 d0d81e 99024->99025 99026 caa961 22 API calls 99025->99026 99027 d0d826 99026->99027 99028 caa961 22 API calls 99027->99028 99029 d0d82e 99028->99029 99030 caa961 22 API calls 99029->99030 99031 d0d836 99030->99031 99032 ca525f 22 API calls 99031->99032 99033 d0d84d 99032->99033 99034 ca525f 22 API calls 99033->99034 99035 d0d866 99034->99035 99036 ca4c6d 22 API calls 99035->99036 99037 d0d872 99036->99037 99038 d0d885 99037->99038 99039 ca93b2 22 API calls 99037->99039 99040 ca4c6d 22 API calls 99038->99040 99039->99038 99041 d0d88e 99040->99041 99042 d0d89e 99041->99042 99043 ca93b2 22 API calls 99041->99043 99044 d0d8b0 99042->99044 99045 caa8c7 22 API calls 99042->99045 99043->99042 99046 ca6350 22 API calls 99044->99046 99045->99044 99047 d0d8bb 99046->99047 99121 d0d978 22 API calls 99047->99121 99049 d0d8ca 99122 d0d978 22 API calls 99049->99122 99051 d0d8dd 99052 ca4c6d 22 API calls 99051->99052 99053 d0d8e7 99052->99053 99054 d0d8ec 99053->99054 99055 d0d8fe 99053->99055 99056 ca33c6 22 API calls 99054->99056 99057 ca4c6d 22 API calls 99055->99057 99058 d0d8f9 99056->99058 99059 d0d907 99057->99059 99062 ca6350 22 API calls 99058->99062 99060 d0d925 99059->99060 99061 ca33c6 22 API calls 99059->99061 99063 ca6350 22 API calls 99060->99063 99061->99058 99062->99060 99063->99014 99065 d12954 __wsopen_s 99064->99065 99066 cbfe0b 22 API calls 99065->99066 99067 d12971 99066->99067 99068 ca5722 22 API calls 99067->99068 99069 d1297b 99068->99069 99070 d1274e 27 API calls 99069->99070 99071 d12986 99070->99071 99072 ca511f 64 API calls 99071->99072 99073 d1299b 99072->99073 99074 d12a6c 99073->99074 99075 d129bf 99073->99075 99076 d12e66 75 API calls 99074->99076 99077 d12e66 75 API calls 99075->99077 99092 d12a38 99076->99092 99078 d129c4 99077->99078 99082 d12a75 messages 99078->99082 99127 ccd583 26 API calls 99078->99127 99080 ca50f5 40 API calls 99081 d12a91 99080->99081 99083 ca50f5 40 API calls 99081->99083 99082->98648 99085 d12aa1 99083->99085 99084 d129ed 99128 ccd583 26 API calls 99084->99128 99086 ca50f5 40 API calls 99085->99086 99088 d12abc 99086->99088 99089 ca50f5 40 API calls 99088->99089 99090 d12acc 99089->99090 99091 ca50f5 40 API calls 99090->99091 99093 d12ae7 99091->99093 99092->99080 99092->99082 99094 ca50f5 40 API calls 99093->99094 99095 d12af7 99094->99095 99096 ca50f5 40 API calls 99095->99096 99097 d12b07 99096->99097 99098 ca50f5 40 API calls 99097->99098 99099 d12b17 99098->99099 99123 d13017 GetTempPathW GetTempFileNameW 99099->99123 99101 d12b22 99102 cce5eb 29 API calls 99101->99102 99113 d12b33 99102->99113 99103 d12bed 99104 cce678 67 API calls 99103->99104 99105 d12bf8 99104->99105 99107 d12c12 99105->99107 99108 d12bfe DeleteFileW 99105->99108 99106 ca50f5 40 API calls 99106->99113 99109 d12c91 CopyFileW 99107->99109 99115 d12c18 99107->99115 99108->99082 99110 d12ca7 DeleteFileW 99109->99110 99111 d12cb9 DeleteFileW 99109->99111 99110->99082 99124 d12fd8 CreateFileW 99111->99124 99113->99082 99113->99103 99113->99106 99114 ccdbb3 65 API calls 99113->99114 99114->99113 99116 d122ce 79 API calls 99115->99116 99117 d12c7c 99116->99117 99117->99111 99118 d12c80 DeleteFileW 99117->99118 99118->99082 99119->98608 99120->98621 99121->99049 99122->99051 99123->99101 99125 d13013 99124->99125 99126 d12fff SetFileTime CloseHandle 99124->99126 99125->99082 99126->99125 99127->99084 99128->99092 99130 caae01 99129->99130 99133 caae1c messages 99129->99133 99131 caaec9 22 API calls 99130->99131 99132 caae09 CharUpperBuffW 99131->99132 99132->99133 99133->98339 99136 caacae 99134->99136 99135 caacd1 99135->98364 99136->99135 99164 d1359c 82 API calls __wsopen_s 99136->99164 99139 cefadb 99138->99139 99140 caad92 99138->99140 99141 cbfddb 22 API calls 99140->99141 99142 caad99 99141->99142 99165 caadcd 99142->99165 99145->98390 99146->98365 99147->98365 99148->98342 99149->98378 99150->98358 99151->98378 99152->98378 99153->98364 99154->98364 99155->98364 99156->98364 99157->98364 99158->98364 99159->98373 99160->98378 99161->98369 99162->98389 99163->98378 99164->99135 99171 caaddd 99165->99171 99166 caadb6 99166->98364 99167 cbfddb 22 API calls 99167->99171 99168 caa961 22 API calls 99168->99171 99169 caa8c7 22 API calls 99169->99171 99170 caadcd 22 API calls 99170->99171 99171->99166 99171->99167 99171->99168 99171->99169 99171->99170 99172->98405 99173->98405 99174->98415 99175->98415 99176->98400 99177->98415 99178 cd8402 99183 cd81be 99178->99183 99182 cd842a 99188 cd81ef try_get_first_available_module 99183->99188 99185 cd83ee 99202 cd27ec 26 API calls __cftof 99185->99202 99187 cd8343 99187->99182 99195 ce0984 99187->99195 99194 cd8338 99188->99194 99198 cc8e0b 40 API calls 2 library calls 99188->99198 99190 cd838c 99190->99194 99199 cc8e0b 40 API calls 2 library calls 99190->99199 99192 cd83ab 99192->99194 99200 cc8e0b 40 API calls 2 library calls 99192->99200 99194->99187 99201 ccf2d9 20 API calls __dosmaperr 99194->99201 99203 ce0081 99195->99203 99197 ce099f 99197->99182 99198->99190 99199->99192 99200->99194 99201->99185 99202->99187 99206 ce008d __FrameHandler3::FrameUnwindToState 99203->99206 99204 ce009b 99261 ccf2d9 20 API calls __dosmaperr 99204->99261 99206->99204 99208 ce00d4 99206->99208 99207 ce00a0 99262 cd27ec 26 API calls __cftof 99207->99262 99214 ce065b 99208->99214 99213 ce00aa __fread_nolock 99213->99197 99264 ce042f 99214->99264 99217 ce068d 99296 ccf2c6 20 API calls __dosmaperr 99217->99296 99218 ce06a6 99282 cd5221 99218->99282 99221 ce0692 99297 ccf2d9 20 API calls __dosmaperr 99221->99297 99222 ce06ab 99223 ce06cb 99222->99223 99224 ce06b4 99222->99224 99295 ce039a CreateFileW 99223->99295 99298 ccf2c6 20 API calls __dosmaperr 99224->99298 99228 ce00f8 99263 ce0121 LeaveCriticalSection __wsopen_s 99228->99263 99229 ce06b9 99299 ccf2d9 20 API calls __dosmaperr 99229->99299 99230 ce0781 GetFileType 99233 ce078c GetLastError 99230->99233 99234 ce07d3 99230->99234 99232 ce0756 GetLastError 99301 ccf2a3 20 API calls 2 library calls 99232->99301 99302 ccf2a3 20 API calls 2 library calls 99233->99302 99304 cd516a 21 API calls 3 library calls 99234->99304 99235 ce0704 99235->99230 99235->99232 99300 ce039a CreateFileW 99235->99300 99239 ce079a CloseHandle 99239->99221 99242 ce07c3 99239->99242 99241 ce0749 99241->99230 99241->99232 99303 ccf2d9 20 API calls __dosmaperr 99242->99303 99244 ce07f4 99246 ce0840 99244->99246 99305 ce05ab 72 API calls 4 library calls 99244->99305 99245 ce07c8 99245->99221 99250 ce086d 99246->99250 99306 ce014d 72 API calls 4 library calls 99246->99306 99249 ce0866 99249->99250 99251 ce087e 99249->99251 99252 cd86ae __wsopen_s 29 API calls 99250->99252 99251->99228 99253 ce08fc CloseHandle 99251->99253 99252->99228 99307 ce039a CreateFileW 99253->99307 99255 ce0927 99256 ce095d 99255->99256 99257 ce0931 GetLastError 99255->99257 99256->99228 99308 ccf2a3 20 API calls 2 library calls 99257->99308 99259 ce093d 99309 cd5333 21 API calls 3 library calls 99259->99309 99261->99207 99262->99213 99263->99213 99265 ce046a 99264->99265 99266 ce0450 99264->99266 99310 ce03bf 99265->99310 99266->99265 99317 ccf2d9 20 API calls __dosmaperr 99266->99317 99268 ce04a2 99272 ce04d1 99268->99272 99319 ccf2d9 20 API calls __dosmaperr 99268->99319 99270 ce045f 99318 cd27ec 26 API calls __cftof 99270->99318 99277 ce0524 99272->99277 99321 ccd70d 26 API calls 2 library calls 99272->99321 99275 ce051f 99275->99277 99278 ce059e 99275->99278 99276 ce04c6 99320 cd27ec 26 API calls __cftof 99276->99320 99277->99217 99277->99218 99322 cd27fc 11 API calls _abort 99278->99322 99281 ce05aa 99283 cd522d __FrameHandler3::FrameUnwindToState 99282->99283 99325 cd2f5e EnterCriticalSection 99283->99325 99285 cd5234 99286 cd5259 99285->99286 99291 cd52c7 EnterCriticalSection 99285->99291 99292 cd527b 99285->99292 99329 cd5000 99286->99329 99288 cd52a4 __fread_nolock 99288->99222 99291->99292 99293 cd52d4 LeaveCriticalSection 99291->99293 99326 cd532a 99292->99326 99293->99285 99295->99235 99296->99221 99297->99228 99298->99229 99299->99221 99300->99241 99301->99221 99302->99239 99303->99245 99304->99244 99305->99246 99306->99249 99307->99255 99308->99259 99309->99256 99312 ce03d7 99310->99312 99311 ce03f2 99311->99268 99312->99311 99323 ccf2d9 20 API calls __dosmaperr 99312->99323 99314 ce0416 99324 cd27ec 26 API calls __cftof 99314->99324 99316 ce0421 99316->99268 99317->99270 99318->99265 99319->99276 99320->99272 99321->99275 99322->99281 99323->99314 99324->99316 99325->99285 99337 cd2fa6 LeaveCriticalSection 99326->99337 99328 cd5331 99328->99288 99330 cd4c7d pre_c_initialization 20 API calls 99329->99330 99332 cd5012 99330->99332 99331 cd501f 99333 cd29c8 _free 20 API calls 99331->99333 99332->99331 99338 cd3405 11 API calls 2 library calls 99332->99338 99335 cd5071 99333->99335 99335->99292 99336 cd5147 EnterCriticalSection 99335->99336 99336->99292 99337->99328 99338->99332 99339 ca105b 99344 ca344d 99339->99344 99341 ca106a 99375 cc00a3 29 API calls __onexit 99341->99375 99343 ca1074 99345 ca345d __wsopen_s 99344->99345 99346 caa961 22 API calls 99345->99346 99347 ca3513 99346->99347 99348 ca3a5a 24 API calls 99347->99348 99349 ca351c 99348->99349 99376 ca3357 99349->99376 99352 ca33c6 22 API calls 99353 ca3535 99352->99353 99354 ca515f 22 API calls 99353->99354 99355 ca3544 99354->99355 99356 caa961 22 API calls 99355->99356 99357 ca354d 99356->99357 99358 caa6c3 22 API calls 99357->99358 99359 ca3556 RegOpenKeyExW 99358->99359 99360 ce3176 RegQueryValueExW 99359->99360 99364 ca3578 99359->99364 99361 ce320c RegCloseKey 99360->99361 99362 ce3193 99360->99362 99361->99364 99374 ce321e _wcslen 99361->99374 99363 cbfe0b 22 API calls 99362->99363 99365 ce31ac 99363->99365 99364->99341 99366 ca5722 22 API calls 99365->99366 99367 ce31b7 RegQueryValueExW 99366->99367 99368 ce31d4 99367->99368 99371 ce31ee messages 99367->99371 99369 ca6b57 22 API calls 99368->99369 99369->99371 99370 ca4c6d 22 API calls 99370->99374 99371->99361 99372 ca9cb3 22 API calls 99372->99374 99373 ca515f 22 API calls 99373->99374 99374->99364 99374->99370 99374->99372 99374->99373 99375->99343 99377 ce1f50 __wsopen_s 99376->99377 99378 ca3364 GetFullPathNameW 99377->99378 99379 ca3386 99378->99379 99380 ca6b57 22 API calls 99379->99380 99381 ca33a4 99380->99381 99381->99352 99382 ca1098 99387 ca42de 99382->99387 99386 ca10a7 99388 caa961 22 API calls 99387->99388 99389 ca42f5 GetVersionExW 99388->99389 99390 ca6b57 22 API calls 99389->99390 99391 ca4342 99390->99391 99392 ca93b2 22 API calls 99391->99392 99397 ca4378 99391->99397 99393 ca436c 99392->99393 99395 ca37a0 22 API calls 99393->99395 99394 ca441b GetCurrentProcess IsWow64Process 99396 ca4437 99394->99396 99395->99397 99398 ca444f LoadLibraryA 99396->99398 99399 ce3824 GetSystemInfo 99396->99399 99397->99394 99400 ce37df 99397->99400 99401 ca449c GetSystemInfo 99398->99401 99402 ca4460 GetProcAddress 99398->99402 99404 ca4476 99401->99404 99402->99401 99403 ca4470 GetNativeSystemInfo 99402->99403 99403->99404 99405 ca447a FreeLibrary 99404->99405 99406 ca109d 99404->99406 99405->99406 99407 cc00a3 29 API calls __onexit 99406->99407 99407->99386 99408 caf7bf 99409 caf7d3 99408->99409 99410 cafcb6 99408->99410 99412 cafcc2 99409->99412 99413 cbfddb 22 API calls 99409->99413 99445 caaceb 23 API calls messages 99410->99445 99446 caaceb 23 API calls messages 99412->99446 99415 caf7e5 99413->99415 99415->99412 99416 caf83e 99415->99416 99417 cafd3d 99415->99417 99419 cb1310 256 API calls 99416->99419 99433 caed9d messages 99416->99433 99447 d11155 22 API calls 99417->99447 99441 caec76 messages 99419->99441 99420 cbfddb 22 API calls 99420->99441 99421 cafef7 99427 caa8c7 22 API calls 99421->99427 99421->99433 99424 cf4600 99430 caa8c7 22 API calls 99424->99430 99424->99433 99425 cf4b0b 99449 d1359c 82 API calls __wsopen_s 99425->99449 99426 caa8c7 22 API calls 99426->99441 99427->99433 99430->99433 99432 cafbe3 99432->99433 99435 cf4bdc 99432->99435 99442 caf3ae messages 99432->99442 99434 caa961 22 API calls 99434->99441 99450 d1359c 82 API calls __wsopen_s 99435->99450 99437 cc0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 99437->99441 99438 cf4beb 99451 d1359c 82 API calls __wsopen_s 99438->99451 99439 cc00a3 29 API calls pre_c_initialization 99439->99441 99440 cc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 99440->99441 99441->99420 99441->99421 99441->99424 99441->99425 99441->99426 99441->99432 99441->99433 99441->99434 99441->99437 99441->99438 99441->99439 99441->99440 99441->99442 99443 cb01e0 256 API calls 2 library calls 99441->99443 99444 cb06a0 41 API calls messages 99441->99444 99442->99433 99448 d1359c 82 API calls __wsopen_s 99442->99448 99443->99441 99444->99441 99445->99412 99446->99417 99447->99433 99448->99433 99449->99433 99450->99438 99451->99433 99452 cd90fa 99453 cd9107 99452->99453 99457 cd911f 99452->99457 99502 ccf2d9 20 API calls __dosmaperr 99453->99502 99455 cd910c 99503 cd27ec 26 API calls __cftof 99455->99503 99458 cd917a 99457->99458 99466 cd9117 99457->99466 99504 cdfdc4 21 API calls 2 library calls 99457->99504 99460 ccd955 __fread_nolock 26 API calls 99458->99460 99461 cd9192 99460->99461 99472 cd8c32 99461->99472 99463 cd9199 99464 ccd955 __fread_nolock 26 API calls 99463->99464 99463->99466 99465 cd91c5 99464->99465 99465->99466 99467 ccd955 __fread_nolock 26 API calls 99465->99467 99468 cd91d3 99467->99468 99468->99466 99469 ccd955 __fread_nolock 26 API calls 99468->99469 99470 cd91e3 99469->99470 99471 ccd955 __fread_nolock 26 API calls 99470->99471 99471->99466 99473 cd8c3e __FrameHandler3::FrameUnwindToState 99472->99473 99474 cd8c5e 99473->99474 99475 cd8c46 99473->99475 99476 cd8d24 99474->99476 99481 cd8c97 99474->99481 99506 ccf2c6 20 API calls __dosmaperr 99475->99506 99513 ccf2c6 20 API calls __dosmaperr 99476->99513 99478 cd8c4b 99507 ccf2d9 20 API calls __dosmaperr 99478->99507 99483 cd8cbb 99481->99483 99484 cd8ca6 99481->99484 99482 cd8d29 99514 ccf2d9 20 API calls __dosmaperr 99482->99514 99505 cd5147 EnterCriticalSection 99483->99505 99508 ccf2c6 20 API calls __dosmaperr 99484->99508 99488 cd8cb3 99515 cd27ec 26 API calls __cftof 99488->99515 99489 cd8cab 99509 ccf2d9 20 API calls __dosmaperr 99489->99509 99490 cd8cc1 99494 cd8cdd 99490->99494 99495 cd8cf2 99490->99495 99492 cd8c53 __fread_nolock 99492->99463 99510 ccf2d9 20 API calls __dosmaperr 99494->99510 99497 cd8d45 __fread_nolock 38 API calls 99495->99497 99499 cd8ced 99497->99499 99498 cd8ce2 99511 ccf2c6 20 API calls __dosmaperr 99498->99511 99512 cd8d1c LeaveCriticalSection __wsopen_s 99499->99512 99502->99455 99503->99466 99504->99458 99505->99490 99506->99478 99507->99492 99508->99489 99509->99488 99510->99498 99511->99499 99512->99492 99513->99482 99514->99488 99515->99492 99516 cc03fb 99517 cc0407 __FrameHandler3::FrameUnwindToState 99516->99517 99545 cbfeb1 99517->99545 99519 cc040e 99520 cc0561 99519->99520 99523 cc0438 99519->99523 99572 cc083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 99520->99572 99522 cc0568 99573 cc4e52 28 API calls _abort 99522->99573 99534 cc0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 99523->99534 99556 cd247d 99523->99556 99525 cc056e 99574 cc4e04 28 API calls _abort 99525->99574 99529 cc0576 99530 cc0457 99532 cc04d8 99564 cc0959 99532->99564 99534->99532 99568 cc4e1a 38 API calls 3 library calls 99534->99568 99536 cc04de 99537 cc04f3 99536->99537 99569 cc0992 GetModuleHandleW 99537->99569 99539 cc04fa 99539->99522 99541 cc04fe 99539->99541 99540 cc0507 99571 cc0040 13 API calls 2 library calls 99540->99571 99541->99540 99570 cc4df5 28 API calls _abort 99541->99570 99544 cc050f 99544->99530 99546 cbfeba 99545->99546 99575 cc0698 IsProcessorFeaturePresent 99546->99575 99548 cbfec6 99576 cc2c94 10 API calls 3 library calls 99548->99576 99550 cbfecb 99551 cbfecf 99550->99551 99577 cd2317 99550->99577 99551->99519 99554 cbfee6 99554->99519 99558 cd2494 99556->99558 99557 cc0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 99559 cc0451 99557->99559 99558->99557 99559->99530 99560 cd2421 99559->99560 99562 cd2450 99560->99562 99561 cc0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 99563 cd2479 99561->99563 99562->99561 99563->99534 99620 cc2340 99564->99620 99567 cc097f 99567->99536 99568->99532 99569->99539 99570->99540 99571->99544 99572->99522 99573->99525 99574->99529 99575->99548 99576->99550 99581 cdd1f6 99577->99581 99580 cc2cbd 8 API calls 3 library calls 99580->99551 99584 cdd213 99581->99584 99585 cdd20f 99581->99585 99582 cc0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 99583 cbfed8 99582->99583 99583->99554 99583->99580 99584->99585 99587 cd4bfb 99584->99587 99585->99582 99588 cd4c07 __FrameHandler3::FrameUnwindToState 99587->99588 99599 cd2f5e EnterCriticalSection 99588->99599 99590 cd4c0e 99600 cd50af 99590->99600 99592 cd4c1d 99593 cd4c2c 99592->99593 99613 cd4a8f 29 API calls 99592->99613 99615 cd4c48 LeaveCriticalSection _abort 99593->99615 99596 cd4c27 99614 cd4b45 GetStdHandle GetFileType 99596->99614 99597 cd4c3d __fread_nolock 99597->99584 99599->99590 99601 cd50bb __FrameHandler3::FrameUnwindToState 99600->99601 99602 cd50df 99601->99602 99603 cd50c8 99601->99603 99616 cd2f5e EnterCriticalSection 99602->99616 99617 ccf2d9 20 API calls __dosmaperr 99603->99617 99606 cd50cd 99618 cd27ec 26 API calls __cftof 99606->99618 99608 cd50d7 __fread_nolock 99608->99592 99609 cd5117 99619 cd513e LeaveCriticalSection _abort 99609->99619 99611 cd5000 __wsopen_s 21 API calls 99612 cd50eb 99611->99612 99612->99609 99612->99611 99613->99596 99614->99593 99615->99597 99616->99612 99617->99606 99618->99608 99619->99608 99621 cc096c GetStartupInfoW 99620->99621 99621->99567 99622 ca1033 99627 ca4c91 99622->99627 99626 ca1042 99628 caa961 22 API calls 99627->99628 99629 ca4cff 99628->99629 99635 ca3af0 99629->99635 99632 ca4d9c 99633 ca1038 99632->99633 99638 ca51f7 22 API calls __fread_nolock 99632->99638 99634 cc00a3 29 API calls __onexit 99633->99634 99634->99626 99639 ca3b1c 99635->99639 99638->99632 99640 ca3b0f 99639->99640 99641 ca3b29 99639->99641 99640->99632 99641->99640 99642 ca3b30 RegOpenKeyExW 99641->99642 99642->99640 99643 ca3b4a RegQueryValueExW 99642->99643 99644 ca3b6b 99643->99644 99645 ca3b80 RegCloseKey 99643->99645 99644->99645 99645->99640 99646 ca3156 99649 ca3170 99646->99649 99650 ca3187 99649->99650 99651 ca31e9 99650->99651 99652 ca31eb 99650->99652 99653 ca318c 99650->99653 99654 ca31d0 DefWindowProcW 99651->99654 99655 ce2dfb 99652->99655 99656 ca31f1 99652->99656 99657 ca3199 99653->99657 99658 ca3265 PostQuitMessage 99653->99658 99659 ca316a 99654->99659 99698 ca18e2 10 API calls 99655->99698 99660 ca31f8 99656->99660 99661 ca321d SetTimer RegisterWindowMessageW 99656->99661 99663 ce2e7c 99657->99663 99664 ca31a4 99657->99664 99658->99659 99665 ce2d9c 99660->99665 99666 ca3201 KillTimer 99660->99666 99661->99659 99668 ca3246 CreatePopupMenu 99661->99668 99703 d0bf30 34 API calls ___scrt_fastfail 99663->99703 99669 ca31ae 99664->99669 99670 ce2e68 99664->99670 99672 ce2dd7 MoveWindow 99665->99672 99673 ce2da1 99665->99673 99694 ca30f2 Shell_NotifyIconW ___scrt_fastfail 99666->99694 99667 ce2e1c 99699 cbe499 42 API calls 99667->99699 99668->99659 99677 ce2e4d 99669->99677 99678 ca31b9 99669->99678 99702 d0c161 27 API calls ___scrt_fastfail 99670->99702 99672->99659 99680 ce2dc6 SetFocus 99673->99680 99681 ce2da7 99673->99681 99677->99654 99701 d00ad7 22 API calls 99677->99701 99684 ca31c4 99678->99684 99685 ca3253 99678->99685 99679 ce2e8e 99679->99654 99679->99659 99680->99659 99681->99684 99686 ce2db0 99681->99686 99682 ca3214 99695 ca3c50 DeleteObject DestroyWindow 99682->99695 99683 ca3263 99683->99659 99684->99654 99700 ca30f2 Shell_NotifyIconW ___scrt_fastfail 99684->99700 99696 ca326f 44 API calls ___scrt_fastfail 99685->99696 99697 ca18e2 10 API calls 99686->99697 99692 ce2e41 99693 ca3837 49 API calls 99692->99693 99693->99651 99694->99682 99695->99659 99696->99683 99697->99659 99698->99667 99699->99684 99700->99692 99701->99651 99702->99683 99703->99679 99704 ca2e37 99705 caa961 22 API calls 99704->99705 99706 ca2e4d 99705->99706 99783 ca4ae3 99706->99783 99708 ca2e6b 99709 ca3a5a 24 API calls 99708->99709 99710 ca2e7f 99709->99710 99711 ca9cb3 22 API calls 99710->99711 99712 ca2e8c 99711->99712 99713 ca4ecb 94 API calls 99712->99713 99714 ca2ea5 99713->99714 99715 ca2ead 99714->99715 99716 ce2cb0 99714->99716 99720 caa8c7 22 API calls 99715->99720 99717 d12cf9 80 API calls 99716->99717 99718 ce2cc3 99717->99718 99719 ce2ccf 99718->99719 99721 ca4f39 68 API calls 99718->99721 99725 ca4f39 68 API calls 99719->99725 99722 ca2ec3 99720->99722 99721->99719 99797 ca6f88 22 API calls 99722->99797 99724 ca2ecf 99726 ca9cb3 22 API calls 99724->99726 99727 ce2ce5 99725->99727 99728 ca2edc 99726->99728 99813 ca3084 22 API calls 99727->99813 99798 caa81b 41 API calls 99728->99798 99731 ca2eec 99733 ca9cb3 22 API calls 99731->99733 99732 ce2d02 99814 ca3084 22 API calls 99732->99814 99735 ca2f12 99733->99735 99799 caa81b 41 API calls 99735->99799 99736 ce2d1e 99738 ca3a5a 24 API calls 99736->99738 99739 ce2d44 99738->99739 99815 ca3084 22 API calls 99739->99815 99741 ca2f21 99742 caa961 22 API calls 99741->99742 99744 ca2f3f 99742->99744 99743 ce2d50 99745 caa8c7 22 API calls 99743->99745 99800 ca3084 22 API calls 99744->99800 99747 ce2d5e 99745->99747 99816 ca3084 22 API calls 99747->99816 99748 ca2f4b 99801 cc4a28 40 API calls 3 library calls 99748->99801 99751 ce2d6d 99754 caa8c7 22 API calls 99751->99754 99752 ca2f59 99752->99727 99753 ca2f63 99752->99753 99802 cc4a28 40 API calls 3 library calls 99753->99802 99756 ce2d83 99754->99756 99817 ca3084 22 API calls 99756->99817 99757 ca2f6e 99757->99732 99759 ca2f78 99757->99759 99803 cc4a28 40 API calls 3 library calls 99759->99803 99760 ce2d90 99762 ca2f83 99762->99736 99763 ca2f8d 99762->99763 99804 cc4a28 40 API calls 3 library calls 99763->99804 99765 ca2f98 99766 ca2fdc 99765->99766 99805 ca3084 22 API calls 99765->99805 99766->99751 99767 ca2fe8 99766->99767 99767->99760 99807 ca63eb 22 API calls 99767->99807 99769 ca2fbf 99771 caa8c7 22 API calls 99769->99771 99773 ca2fcd 99771->99773 99772 ca2ff8 99808 ca6a50 22 API calls 99772->99808 99806 ca3084 22 API calls 99773->99806 99776 ca3006 99809 ca70b0 23 API calls 99776->99809 99780 ca3021 99781 ca3065 99780->99781 99810 ca6f88 22 API calls 99780->99810 99811 ca70b0 23 API calls 99780->99811 99812 ca3084 22 API calls 99780->99812 99784 ca4af0 __wsopen_s 99783->99784 99785 ca6b57 22 API calls 99784->99785 99786 ca4b22 99784->99786 99785->99786 99787 ca4c6d 22 API calls 99786->99787 99796 ca4b58 99786->99796 99787->99786 99788 ca9cb3 22 API calls 99790 ca4c52 99788->99790 99789 ca9cb3 22 API calls 99789->99796 99791 ca515f 22 API calls 99790->99791 99794 ca4c5e 99791->99794 99792 ca4c6d 22 API calls 99792->99796 99793 ca515f 22 API calls 99793->99796 99794->99708 99795 ca4c29 99795->99788 99795->99794 99796->99789 99796->99792 99796->99793 99796->99795 99797->99724 99798->99731 99799->99741 99800->99748 99801->99752 99802->99757 99803->99762 99804->99765 99805->99769 99806->99766 99807->99772 99808->99776 99809->99780 99810->99780 99811->99780 99812->99780 99813->99732 99814->99736 99815->99743 99816->99751 99817->99760

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 234 ca42de-ca434d call caa961 GetVersionExW call ca6b57 239 ce3617-ce362a 234->239 240 ca4353 234->240 241 ce362b-ce362f 239->241 242 ca4355-ca4357 240->242 243 ce3632-ce363e 241->243 244 ce3631 241->244 245 ca435d-ca43bc call ca93b2 call ca37a0 242->245 246 ce3656 242->246 243->241 247 ce3640-ce3642 243->247 244->243 263 ce37df-ce37e6 245->263 264 ca43c2-ca43c4 245->264 250 ce365d-ce3660 246->250 247->242 249 ce3648-ce364f 247->249 249->239 252 ce3651 249->252 253 ca441b-ca4435 GetCurrentProcess IsWow64Process 250->253 254 ce3666-ce36a8 250->254 252->246 256 ca4437 253->256 257 ca4494-ca449a 253->257 254->253 258 ce36ae-ce36b1 254->258 260 ca443d-ca4449 256->260 257->260 261 ce36db-ce36e5 258->261 262 ce36b3-ce36bd 258->262 269 ca444f-ca445e LoadLibraryA 260->269 270 ce3824-ce3828 GetSystemInfo 260->270 265 ce36f8-ce3702 261->265 266 ce36e7-ce36f3 261->266 271 ce36bf-ce36c5 262->271 272 ce36ca-ce36d6 262->272 267 ce37e8 263->267 268 ce3806-ce3809 263->268 264->250 273 ca43ca-ca43dd 264->273 277 ce3704-ce3710 265->277 278 ce3715-ce3721 265->278 266->253 276 ce37ee 267->276 279 ce380b-ce381a 268->279 280 ce37f4-ce37fc 268->280 281 ca449c-ca44a6 GetSystemInfo 269->281 282 ca4460-ca446e GetProcAddress 269->282 271->253 272->253 274 ce3726-ce372f 273->274 275 ca43e3-ca43e5 273->275 285 ce373c-ce3748 274->285 286 ce3731-ce3737 274->286 283 ca43eb-ca43ee 275->283 284 ce374d-ce3762 275->284 276->280 277->253 278->253 279->276 287 ce381c-ce3822 279->287 280->268 289 ca4476-ca4478 281->289 282->281 288 ca4470-ca4474 GetNativeSystemInfo 282->288 290 ca43f4-ca440f 283->290 291 ce3791-ce3794 283->291 292 ce376f-ce377b 284->292 293 ce3764-ce376a 284->293 285->253 286->253 287->280 288->289 294 ca447a-ca447b FreeLibrary 289->294 295 ca4481-ca4493 289->295 296 ce3780-ce378c 290->296 297 ca4415 290->297 291->253 298 ce379a-ce37c1 291->298 292->253 293->253 294->295 296->253 297->253 299 ce37ce-ce37da 298->299 300 ce37c3-ce37c9 298->300 299->253 300->253
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 00CA430D
                                                            • Part of subcall function 00CA6B57: _wcslen.LIBCMT ref: 00CA6B6A
                                                          • GetCurrentProcess.KERNEL32(?,00D3CB64,00000000,?,?), ref: 00CA4422
                                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00CA4429
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00CA4454
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00CA4466
                                                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00CA4474
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 00CA447B
                                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 00CA44A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                          • API String ID: 3290436268-3101561225
                                                          • Opcode ID: 567128170a557ce9e7456b261e16ec9ad56ea7ac1bd90cb97b237dc007736731
                                                          • Instruction ID: 7daf463096d3fe05b5a96b5a660e5c2827013d1bbd0124c06e19a44fdc6e7310
                                                          • Opcode Fuzzy Hash: 567128170a557ce9e7456b261e16ec9ad56ea7ac1bd90cb97b237dc007736731
                                                          • Instruction Fuzzy Hash: 64A1F37A91A3C0CFC715CB7E7C451A57FA47B67304B085A9AE08DD7BA2F2604688DB31

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 637 ca42a2-ca42ba CreateStreamOnHGlobal 638 ca42da-ca42dd 637->638 639 ca42bc-ca42d3 FindResourceExW 637->639 640 ca42d9 639->640 641 ce35ba-ce35c9 LoadResource 639->641 640->638 641->640 642 ce35cf-ce35dd SizeofResource 641->642 642->640 643 ce35e3-ce35ee LockResource 642->643 643->640 644 ce35f4-ce3612 643->644 644->640
                                                          APIs
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00CA50AA,?,?,00000000,00000000), ref: 00CA42B2
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00CA50AA,?,?,00000000,00000000), ref: 00CA42C9
                                                          • LoadResource.KERNEL32(?,00000000,?,?,00CA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00CA4F20), ref: 00CE35BE
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,00CA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00CA4F20), ref: 00CE35D3
                                                          • LockResource.KERNEL32(00CA50AA,?,?,00CA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00CA4F20,?), ref: 00CE35E6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 3d9c1951c1989699f48eab2a8ee3bd5c8681c24d2c16f7afdf057dc5ed975762
                                                          • Instruction ID: 16cdc337e22fae8ca31e96f1b14659934c6ecc9cfb362e20642e4bc8e7e1a4a8
                                                          • Opcode Fuzzy Hash: 3d9c1951c1989699f48eab2a8ee3bd5c8681c24d2c16f7afdf057dc5ed975762
                                                          • Instruction Fuzzy Hash: 80118E75240701BFD7258B65DC48F277BB9EBC6B55F104269F412EA250DBB1DD008730

                                                          Control-flow Graph

                                                          APIs
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00CA2B6B
                                                            • Part of subcall function 00CA3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00D71418,?,00CA2E7F,?,?,?,00000000), ref: 00CA3A78
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,00D62224), ref: 00CE2C10
                                                          • ShellExecuteW.SHELL32(00000000,?,?,00D62224), ref: 00CE2C17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                          • String ID: runas
                                                          • API String ID: 448630720-4000483414
                                                          • Opcode ID: 93c1224f00aebac3c1b0cb81badc2f477f7a781987e5bba8965f65700f9b63b1
                                                          • Instruction ID: 14a410c24147b5da4991358393bb32eef250b34925ec1ba647e6ca82c9dd0c20
                                                          • Opcode Fuzzy Hash: 93c1224f00aebac3c1b0cb81badc2f477f7a781987e5bba8965f65700f9b63b1
                                                          • Instruction Fuzzy Hash: 7F11B4312083835BC714FF68E8669BE77A49B9335CF44552DF057521A2DF208A4AA732
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,00CE5222), ref: 00D0DBCE
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 00D0DBDD
                                                          • FindFirstFileW.KERNELBASE(?,?), ref: 00D0DBEE
                                                          • FindClose.KERNEL32(00000000), ref: 00D0DBFA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                                          • String ID:
                                                          • API String ID: 2695905019-0
                                                          • Opcode ID: 72101fbcc153c051422b1d5290610a1d9178e43264c8eedae0f70726e1a0288f
                                                          • Instruction ID: 99e105c7f183cf2045e32cf12e286e5c5438b736e4e211dd8a9b3975ad87a8a6
                                                          • Opcode Fuzzy Hash: 72101fbcc153c051422b1d5290610a1d9178e43264c8eedae0f70726e1a0288f
                                                          • Instruction Fuzzy Hash: EEF0A73142062057D2206BB89C0D56F3B7D9E05334B144703F879D11E0EBB0595486BD
                                                          APIs
                                                          • GetInputState.USER32 ref: 00CAD807
                                                          • timeGetTime.WINMM ref: 00CADA07
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00CADB28
                                                          • TranslateMessage.USER32(?), ref: 00CADB7B
                                                          • DispatchMessageW.USER32(?), ref: 00CADB89
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00CADB9F
                                                          • Sleep.KERNEL32(0000000A), ref: 00CADBB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                          • String ID:
                                                          • API String ID: 2189390790-0
                                                          • Opcode ID: 90f0809d0d05c95599dcce83ae768eb86f6f8f2ba8b1a24c8dab4a61e8f19389
                                                          • Instruction ID: f0e7da320600481fb9aeb052921aca58a0bbcdba6e2d8dfd62aac1f8a5fadfce
                                                          • Opcode Fuzzy Hash: 90f0809d0d05c95599dcce83ae768eb86f6f8f2ba8b1a24c8dab4a61e8f19389
                                                          • Instruction Fuzzy Hash: A242D130608346DFD768CF25C884BBAB7E0BF46318F144619E967876A1D770E984DBA3

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00CA2D07
                                                          • RegisterClassExW.USER32(00000030), ref: 00CA2D31
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00CA2D42
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00CA2D5F
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00CA2D6F
                                                          • LoadIconW.USER32(000000A9), ref: 00CA2D85
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00CA2D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 13ff7899c5ff3461d3ec67ffec0fc217f0ad6f1c379808fad1ed9d318440c1d0
                                                          • Instruction ID: 1611533b31fd5b976eaf2a4497ea232bef6b2c5f60b6251900ac8bdfd1ecc788
                                                          • Opcode Fuzzy Hash: 13ff7899c5ff3461d3ec67ffec0fc217f0ad6f1c379808fad1ed9d318440c1d0
                                                          • Instruction Fuzzy Hash: 8E21E7B9911309AFDB00DFA8E849BDDBBB4FB08700F10521AEA15F6390E7B145448FA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 302 ce065b-ce068b call ce042f 305 ce068d-ce0698 call ccf2c6 302->305 306 ce06a6-ce06b2 call cd5221 302->306 311 ce069a-ce06a1 call ccf2d9 305->311 312 ce06cb-ce0714 call ce039a 306->312 313 ce06b4-ce06c9 call ccf2c6 call ccf2d9 306->313 322 ce097d-ce0983 311->322 320 ce0716-ce071f 312->320 321 ce0781-ce078a GetFileType 312->321 313->311 324 ce0756-ce077c GetLastError call ccf2a3 320->324 325 ce0721-ce0725 320->325 326 ce078c-ce07bd GetLastError call ccf2a3 CloseHandle 321->326 327 ce07d3-ce07d6 321->327 324->311 325->324 331 ce0727-ce0754 call ce039a 325->331 326->311 341 ce07c3-ce07ce call ccf2d9 326->341 329 ce07df-ce07e5 327->329 330 ce07d8-ce07dd 327->330 334 ce07e9-ce0837 call cd516a 329->334 335 ce07e7 329->335 330->334 331->321 331->324 345 ce0839-ce0845 call ce05ab 334->345 346 ce0847-ce086b call ce014d 334->346 335->334 341->311 345->346 351 ce086f-ce0879 call cd86ae 345->351 352 ce087e-ce08c1 346->352 353 ce086d 346->353 351->322 355 ce08e2-ce08f0 352->355 356 ce08c3-ce08c7 352->356 353->351 359 ce097b 355->359 360 ce08f6-ce08fa 355->360 356->355 358 ce08c9-ce08dd 356->358 358->355 359->322 360->359 361 ce08fc-ce092f CloseHandle call ce039a 360->361 364 ce0963-ce0977 361->364 365 ce0931-ce095d GetLastError call ccf2a3 call cd5333 361->365 364->359 365->364
                                                          APIs
                                                            • Part of subcall function 00CE039A: CreateFileW.KERNELBASE(00000000,00000000,?,00CE0704,?,?,00000000,?,00CE0704,00000000,0000000C), ref: 00CE03B7
                                                          • GetLastError.KERNEL32 ref: 00CE076F
                                                          • __dosmaperr.LIBCMT ref: 00CE0776
                                                          • GetFileType.KERNELBASE(00000000), ref: 00CE0782
                                                          • GetLastError.KERNEL32 ref: 00CE078C
                                                          • __dosmaperr.LIBCMT ref: 00CE0795
                                                          • CloseHandle.KERNEL32(00000000), ref: 00CE07B5
                                                          • CloseHandle.KERNEL32(?), ref: 00CE08FF
                                                          • GetLastError.KERNEL32 ref: 00CE0931
                                                          • __dosmaperr.LIBCMT ref: 00CE0938
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: 287cec263b0eb354977916f226bb563c9eccfe30e7a29fbab20e4ac96cfd789a
                                                          • Instruction ID: 915c3f220dff9d35e70168e6f3c222c6fe255576b369fd69b104543b1706c0f8
                                                          • Opcode Fuzzy Hash: 287cec263b0eb354977916f226bb563c9eccfe30e7a29fbab20e4ac96cfd789a
                                                          • Instruction Fuzzy Hash: 19A13732A002848FDF19AF68D851BAE7BA1AB06320F24015DF815EB3D1D7719D93DBA1

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00CA3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00D71418,?,00CA2E7F,?,?,?,00000000), ref: 00CA3A78
                                                            • Part of subcall function 00CA3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00CA3379
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00CA356A
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00CE318D
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00CE31CE
                                                          • RegCloseKey.ADVAPI32(?), ref: 00CE3210
                                                          • _wcslen.LIBCMT ref: 00CE3277
                                                          • _wcslen.LIBCMT ref: 00CE3286
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 98802146-2727554177
                                                          • Opcode ID: 0e3cf9bb7fe930c7f79143968e93d75914d201eb56d0c9f409f9d79a83b1236d
                                                          • Instruction ID: 9b198f330af10d291e6cac08757f8afcc3cd607650009b6d93e7e209fef4696b
                                                          • Opcode Fuzzy Hash: 0e3cf9bb7fe930c7f79143968e93d75914d201eb56d0c9f409f9d79a83b1236d
                                                          • Instruction Fuzzy Hash: 8571A1714043819EC304EF65DC869ABBBE8FF85354F40482EF589D72A1EB749A88DB71

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00CA2B8E
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00CA2B9D
                                                          • LoadIconW.USER32(00000063), ref: 00CA2BB3
                                                          • LoadIconW.USER32(000000A4), ref: 00CA2BC5
                                                          • LoadIconW.USER32(000000A2), ref: 00CA2BD7
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00CA2BEF
                                                          • RegisterClassExW.USER32(?), ref: 00CA2C40
                                                            • Part of subcall function 00CA2CD4: GetSysColorBrush.USER32(0000000F), ref: 00CA2D07
                                                            • Part of subcall function 00CA2CD4: RegisterClassExW.USER32(00000030), ref: 00CA2D31
                                                            • Part of subcall function 00CA2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00CA2D42
                                                            • Part of subcall function 00CA2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00CA2D5F
                                                            • Part of subcall function 00CA2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00CA2D6F
                                                            • Part of subcall function 00CA2CD4: LoadIconW.USER32(000000A9), ref: 00CA2D85
                                                            • Part of subcall function 00CA2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00CA2D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: 62b08dd94e092f6bcbf6b99c9bc68b36ab19facfd9cdecf4b6d6fd368d8f3102
                                                          • Instruction ID: fd8648db7f8c348b520a83cec27cc8d4b4705b30a5c3794adb7e19eca370a7c7
                                                          • Opcode Fuzzy Hash: 62b08dd94e092f6bcbf6b99c9bc68b36ab19facfd9cdecf4b6d6fd368d8f3102
                                                          • Instruction Fuzzy Hash: 77212CB9E10314ABDB109FA9EC56B9D7FB4FB48B50F10411AF508E67A0E7B15584CFA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 443 ca3170-ca3185 444 ca3187-ca318a 443->444 445 ca31e5-ca31e7 443->445 447 ca31eb 444->447 448 ca318c-ca3193 444->448 445->444 446 ca31e9 445->446 449 ca31d0-ca31d8 DefWindowProcW 446->449 450 ce2dfb-ce2e23 call ca18e2 call cbe499 447->450 451 ca31f1-ca31f6 447->451 452 ca3199-ca319e 448->452 453 ca3265-ca326d PostQuitMessage 448->453 454 ca31de-ca31e4 449->454 485 ce2e28-ce2e2f 450->485 456 ca31f8-ca31fb 451->456 457 ca321d-ca3244 SetTimer RegisterWindowMessageW 451->457 459 ce2e7c-ce2e90 call d0bf30 452->459 460 ca31a4-ca31a8 452->460 455 ca3219-ca321b 453->455 455->454 461 ce2d9c-ce2d9f 456->461 462 ca3201-ca3214 KillTimer call ca30f2 call ca3c50 456->462 457->455 464 ca3246-ca3251 CreatePopupMenu 457->464 459->455 476 ce2e96 459->476 465 ca31ae-ca31b3 460->465 466 ce2e68-ce2e77 call d0c161 460->466 468 ce2dd7-ce2df6 MoveWindow 461->468 469 ce2da1-ce2da5 461->469 462->455 464->455 473 ce2e4d-ce2e54 465->473 474 ca31b9-ca31be 465->474 466->455 468->455 477 ce2dc6-ce2dd2 SetFocus 469->477 478 ce2da7-ce2daa 469->478 473->449 479 ce2e5a-ce2e63 call d00ad7 473->479 483 ca3253-ca3263 call ca326f 474->483 484 ca31c4-ca31ca 474->484 476->449 477->455 478->484 486 ce2db0-ce2dc1 call ca18e2 478->486 479->449 483->455 484->449 484->485 485->449 491 ce2e35-ce2e48 call ca30f2 call ca3837 485->491 486->455 491->449
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00CA316A,?,?), ref: 00CA31D8
                                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,00CA316A,?,?), ref: 00CA3204
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00CA3227
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00CA316A,?,?), ref: 00CA3232
                                                          • CreatePopupMenu.USER32 ref: 00CA3246
                                                          • PostQuitMessage.USER32(00000000), ref: 00CA3267
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: 311a55d582a104fbea8fdfbf186e1ffcfad8ae9d77e6378ee0395d68535b5c3e
                                                          • Instruction ID: e687aa99a59146e4452019a33a07ee454b27fc6dd5b33ebd11b6ba0829319a59
                                                          • Opcode Fuzzy Hash: 311a55d582a104fbea8fdfbf186e1ffcfad8ae9d77e6378ee0395d68535b5c3e
                                                          • Instruction Fuzzy Hash: DC412739250386ABDB151B7C9C2EB7D3A19E747348F040315FA2AD63E2E7618B40D7B1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 499 cd8d45-cd8d55 500 cd8d6f-cd8d71 499->500 501 cd8d57-cd8d6a call ccf2c6 call ccf2d9 499->501 503 cd90d9-cd90e6 call ccf2c6 call ccf2d9 500->503 504 cd8d77-cd8d7d 500->504 517 cd90f1 501->517 522 cd90ec call cd27ec 503->522 504->503 507 cd8d83-cd8dae 504->507 507->503 510 cd8db4-cd8dbd 507->510 513 cd8dbf-cd8dd2 call ccf2c6 call ccf2d9 510->513 514 cd8dd7-cd8dd9 510->514 513->522 515 cd8ddf-cd8de3 514->515 516 cd90d5-cd90d7 514->516 515->516 520 cd8de9-cd8ded 515->520 521 cd90f4-cd90f9 516->521 517->521 520->513 525 cd8def-cd8e06 520->525 522->517 528 cd8e08-cd8e0b 525->528 529 cd8e23-cd8e2c 525->529 530 cd8e0d-cd8e13 528->530 531 cd8e15-cd8e1e 528->531 532 cd8e2e-cd8e45 call ccf2c6 call ccf2d9 call cd27ec 529->532 533 cd8e4a-cd8e54 529->533 530->531 530->532 536 cd8ebf-cd8ed9 531->536 561 cd900c 532->561 534 cd8e5b-cd8e79 call cd3820 call cd29c8 * 2 533->534 535 cd8e56-cd8e58 533->535 569 cd8e7b-cd8e91 call ccf2d9 call ccf2c6 534->569 570 cd8e96-cd8ebc call cd9424 534->570 535->534 538 cd8fad-cd8fb6 call cdf89b 536->538 539 cd8edf-cd8eef 536->539 552 cd9029 538->552 553 cd8fb8-cd8fca 538->553 539->538 542 cd8ef5-cd8ef7 539->542 542->538 546 cd8efd-cd8f23 542->546 546->538 550 cd8f29-cd8f3c 546->550 550->538 557 cd8f3e-cd8f40 550->557 559 cd902d-cd9045 ReadFile 552->559 553->552 555 cd8fcc-cd8fdb GetConsoleMode 553->555 555->552 560 cd8fdd-cd8fe1 555->560 557->538 562 cd8f42-cd8f6d 557->562 564 cd9047-cd904d 559->564 565 cd90a1-cd90ac GetLastError 559->565 560->559 566 cd8fe3-cd8ffd ReadConsoleW 560->566 567 cd900f-cd9019 call cd29c8 561->567 562->538 568 cd8f6f-cd8f82 562->568 564->565 573 cd904f 564->573 571 cd90ae-cd90c0 call ccf2d9 call ccf2c6 565->571 572 cd90c5-cd90c8 565->572 576 cd8fff GetLastError 566->576 577 cd901e-cd9027 566->577 567->521 568->538 581 cd8f84-cd8f86 568->581 569->561 570->536 571->561 578 cd90ce-cd90d0 572->578 579 cd9005-cd900b call ccf2a3 572->579 575 cd9052-cd9064 573->575 575->567 586 cd9066-cd906a 575->586 576->579 577->575 578->567 579->561 581->538 589 cd8f88-cd8fa8 581->589 592 cd906c-cd907c call cd8a61 586->592 593 cd9083-cd908e 586->593 589->538 604 cd907f-cd9081 592->604 598 cd909a-cd909f call cd88a1 593->598 599 cd9090 call cd8bb1 593->599 605 cd9095-cd9098 598->605 599->605 604->567 605->604
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7f404b8cad575d6617be695cd8dc4377021e9c37ce4e3efda76a69909a84859e
                                                          • Instruction ID: 7ad4634c29ee09b0e1567b25c6a49b4a74889a14bf3122b298d67340912cfc0f
                                                          • Opcode Fuzzy Hash: 7f404b8cad575d6617be695cd8dc4377021e9c37ce4e3efda76a69909a84859e
                                                          • Instruction Fuzzy Hash: AFC1D478E04349AFDB11DFA8D841BADBFB1EF0D310F14419AE629A7392C7349A41DB61

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 607 f50920-f50972 call f50820 CreateFileW 610 f50974-f50976 607->610 611 f5097b-f50988 607->611 612 f50ad4-f50ad8 610->612 614 f5099b-f509b2 VirtualAlloc 611->614 615 f5098a-f50996 611->615 616 f509b4-f509b6 614->616 617 f509bb-f509e1 CreateFileW 614->617 615->612 616->612 619 f50a05-f50a1f ReadFile 617->619 620 f509e3-f50a00 617->620 621 f50a21-f50a3e 619->621 622 f50a43-f50a47 619->622 620->612 621->612 623 f50a49-f50a66 622->623 624 f50a68-f50a7f WriteFile 622->624 623->612 627 f50a81-f50aa8 624->627 628 f50aaa-f50acf FindCloseChangeNotification VirtualFree 624->628 627->612 628->612
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00F50965
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460557566.0000000000F50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_f50000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                          • Instruction ID: 438ae1864eb03bf5ef6ec67ef774b5f9a2d7e1bc9fadd26638867beb7fc7b49f
                                                          • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                          • Instruction Fuzzy Hash: DB51F776A50208FBEF20DFB4CC49FDE7778AF48711F108554FA0AEA280DA749A459B60

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 647 ca2c63-ca2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00CA2C91
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00CA2CB2
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00CA1CAD,?), ref: 00CA2CC6
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00CA1CAD,?), ref: 00CA2CCF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: dcb022980bea03d569288eb51f73eda80ef56eb36c50282fcb72ac2d29eda040
                                                          • Instruction ID: 934f8234dbc14a1fd1feb8f02a986a2c6eefb233be447ee9fa665208bdae47de
                                                          • Opcode Fuzzy Hash: dcb022980bea03d569288eb51f73eda80ef56eb36c50282fcb72ac2d29eda040
                                                          • Instruction Fuzzy Hash: 3CF0DA795503A07AEB31176BAC09F773EBDD7C6F50F01515AF908E27A0E6611890DEB0

                                                          Control-flow Graph

                                                          APIs
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D12C05
                                                          • DeleteFileW.KERNEL32(?), ref: 00D12C87
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00D12C9D
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D12CAE
                                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D12CC0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$Copy
                                                          • String ID:
                                                          • API String ID: 3226157194-0
                                                          • Opcode ID: 650b1f6561c86c02e5004f4cb6c76a5f4b890e996cfd1c5c643091db9795e64c
                                                          • Instruction ID: 76ffd07998001f5910d26348173bb80dd025bb16cc9228c8f25ea7439038fea1
                                                          • Opcode Fuzzy Hash: 650b1f6561c86c02e5004f4cb6c76a5f4b890e996cfd1c5c643091db9795e64c
                                                          • Instruction Fuzzy Hash: 35B16D71900119BBDF21DBA4DD85EEEB7BDEF09350F0040AAF609E6141EA319A949FB0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 868 f523b0-f52501 call f50000 call f522a0 CreateFileW 875 f52503 868->875 876 f52508-f52518 868->876 877 f525d5-f525da 875->877 879 f5251f-f52539 VirtualAlloc 876->879 880 f5251a 876->880 881 f52540-f52557 ReadFile 879->881 882 f5253b 879->882 880->877 883 f52559 881->883 884 f5255b-f52570 call f51070 881->884 882->877 883->877 886 f52575-f525af call f522e0 call f512a0 884->886 891 f525b1-f525c6 call f52330 886->891 892 f525cb-f525d3 886->892 891->892 892->877
                                                          APIs
                                                            • Part of subcall function 00F522A0: Sleep.KERNELBASE(000001F4), ref: 00F522B1
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00F524F7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460557566.0000000000F50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_f50000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateFileSleep
                                                          • String ID: ZYJLTU9PTKP9Y8GR07YQ6
                                                          • API String ID: 2694422964-2099169911
                                                          • Opcode ID: 26b1d4384a3d88f97a80fc3615d0b392e07d0e5610a19a6c87085f19239739d9
                                                          • Instruction ID: 3847b1c25880ad181fac9f63e25bdb2948a047ec8792b6c9363e49d41548dcc3
                                                          • Opcode Fuzzy Hash: 26b1d4384a3d88f97a80fc3615d0b392e07d0e5610a19a6c87085f19239739d9
                                                          • Instruction Fuzzy Hash: 5661B230D04248DBEF11DBB4C854BEEBBB9AF19305F044199E608BB2C0D6B91B49CB66

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 931 ca3b1c-ca3b27 932 ca3b99-ca3b9b 931->932 933 ca3b29-ca3b2e 931->933 934 ca3b8c-ca3b8f 932->934 933->932 935 ca3b30-ca3b48 RegOpenKeyExW 933->935 935->932 936 ca3b4a-ca3b69 RegQueryValueExW 935->936 937 ca3b6b-ca3b76 936->937 938 ca3b80-ca3b8b RegCloseKey 936->938 939 ca3b78-ca3b7a 937->939 940 ca3b90-ca3b97 937->940 938->934 941 ca3b7e 939->941 940->941 941->938
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00CA3B0F,SwapMouseButtons,00000004,?), ref: 00CA3B40
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00CA3B0F,SwapMouseButtons,00000004,?), ref: 00CA3B61
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00CA3B0F,SwapMouseButtons,00000004,?), ref: 00CA3B83
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 0aa221730c27bd8f5516bc6ddce5f0d8f3a55824b4476226ea3ad2638ddfd241
                                                          • Instruction ID: 4a83c00bd1c8bf4384e12433d51a38e91afa87ee58cddcb96c8222704af525c1
                                                          • Opcode Fuzzy Hash: 0aa221730c27bd8f5516bc6ddce5f0d8f3a55824b4476226ea3ad2638ddfd241
                                                          • Instruction Fuzzy Hash: 19112AB5521249FFDB208FA5EC99AAEB7B9EF05748B104459B805E7210D3319F409770
                                                          Strings
                                                          • Variable must be of type 'Object'., xrefs: 00CF32B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable must be of type 'Object'.
                                                          • API String ID: 0-109567571
                                                          • Opcode ID: 3ce9648207678bc6d63a785bfc9a0665cacef256c9e62c778b67e7d6abbcb486
                                                          • Instruction ID: 60c56abfd251662a5d1567ca6cb1081368398b6782ad0e8fbe20cc93f880487b
                                                          • Opcode Fuzzy Hash: 3ce9648207678bc6d63a785bfc9a0665cacef256c9e62c778b67e7d6abbcb486
                                                          • Instruction Fuzzy Hash: E0C2A071E00216DFCB24CF58C880AADB7B1FF4A318F248559E915AB3A1D375EE41DBA1
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00CE33A2
                                                            • Part of subcall function 00CA6B57: _wcslen.LIBCMT ref: 00CA6B6A
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00CA3A04
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_wcslen
                                                          • String ID: Line:
                                                          • API String ID: 2289894680-1585850449
                                                          • Opcode ID: 256aea2ffe7e512705de79d69950e580eda5b7df7f5290fe5f46f2971e04804a
                                                          • Instruction ID: 6b343658e39a09eb598346af34bacafc2d8f326851dd289bc0fe10e913fb22eb
                                                          • Opcode Fuzzy Hash: 256aea2ffe7e512705de79d69950e580eda5b7df7f5290fe5f46f2971e04804a
                                                          • Instruction Fuzzy Hash: 5931F671408341AFC721EB64DC56FEBB7E8AB41318F00461EF499931A1EB709B49D7D2
                                                          APIs
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00CC0668
                                                            • Part of subcall function 00CC32A4: RaiseException.KERNEL32(?,?,?,00CC068A,?,00D71444,?,?,?,?,?,?,00CC068A,00CA1129,00D68738,00CA1129), ref: 00CC3304
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00CC0685
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: Unknown exception
                                                          • API String ID: 3476068407-410509341
                                                          • Opcode ID: 0fdb1bb6129c9da020d37375f4a286b4b1eda81a80ae787485337fbe19a3951f
                                                          • Instruction ID: b5dc62cbdae627264de5b3ce80366b5032d589ac00861a7c3a469a1bf82c604c
                                                          • Opcode Fuzzy Hash: 0fdb1bb6129c9da020d37375f4a286b4b1eda81a80ae787485337fbe19a3951f
                                                          • Instruction Fuzzy Hash: D8F04F3490020DB78F04BAB5EC4AE9E7B6C5E40350F70853DF92496692EF71DB6AA690
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 00F51045
                                                          • ExitProcess.KERNEL32(00000000), ref: 00F51064
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460557566.0000000000F50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_f50000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process$CreateExit
                                                          • String ID: D
                                                          • API String ID: 126409537-2746444292
                                                          • Opcode ID: 5eb2aae7a9647d9e2c45f82c1b7c95c0f5ecba5966e3f1c76f424d9cb9e516ac
                                                          • Instruction ID: 905a79932842f65ccf15203f464157c1dbc82b1f03a484ec5f78d8d7ec09ec32
                                                          • Opcode Fuzzy Hash: 5eb2aae7a9647d9e2c45f82c1b7c95c0f5ecba5966e3f1c76f424d9cb9e516ac
                                                          • Instruction Fuzzy Hash: F9F0FF7294024CABDB60EFE0CD49FEE777CBF04701F148508FB0A9A180EA7896489B61
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00D1302F
                                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00D13044
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: cdea82cefd5bbaeecf39b68d0c2851d9d6ae26db6997c9ac8ab201129811d637
                                                          • Instruction ID: e637c6d61a73a2ba9effc98ebd82e63ab9f1a8bf225b0146c120a43be6eda844
                                                          • Opcode Fuzzy Hash: cdea82cefd5bbaeecf39b68d0c2851d9d6ae26db6997c9ac8ab201129811d637
                                                          • Instruction Fuzzy Hash: 9BD05E765003286BDA20A7A4AC0EFCB3A6CDB05750F0002A1BA55E2191DAB0D984CBE4
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00D282F5
                                                          • TerminateProcess.KERNEL32(00000000), ref: 00D282FC
                                                          • FreeLibrary.KERNEL32(?,?,?,?), ref: 00D284DD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentFreeLibraryTerminate
                                                          • String ID:
                                                          • API String ID: 146820519-0
                                                          • Opcode ID: 24fa707e6774b2fbfe310c5597e4526b679716cdeb9062c7d15c4218b3250507
                                                          • Instruction ID: 1f0e5bdca0f9c97bcad08973725bd508213d545e5cb9b19edd602436146671ad
                                                          • Opcode Fuzzy Hash: 24fa707e6774b2fbfe310c5597e4526b679716cdeb9062c7d15c4218b3250507
                                                          • Instruction Fuzzy Hash: 2B127C719083519FC714DF28D484B6ABBE1FF95318F08895DE8998B352CB31ED46CBA2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cba0f9cca0961138c3b38f2b6b6749277339ce4a1add734961d58211cc8d81e5
                                                          • Instruction ID: 6e16bb98a17799c2fb3ec33db8af8355502f5fd34c16f5b9edfcadac0a8ed2b0
                                                          • Opcode Fuzzy Hash: cba0f9cca0961138c3b38f2b6b6749277339ce4a1add734961d58211cc8d81e5
                                                          • Instruction Fuzzy Hash: 2D51EF75D10609AFDB209FA5C885FAEBFB8AF49310F14005FF615A7391D7718A02EB61
                                                          APIs
                                                            • Part of subcall function 00CA1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00CA1BF4
                                                            • Part of subcall function 00CA1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00CA1BFC
                                                            • Part of subcall function 00CA1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00CA1C07
                                                            • Part of subcall function 00CA1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00CA1C12
                                                            • Part of subcall function 00CA1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00CA1C1A
                                                            • Part of subcall function 00CA1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00CA1C22
                                                            • Part of subcall function 00CA1B4A: RegisterWindowMessageW.USER32(00000004,?,00CA12C4), ref: 00CA1BA2
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00CA136A
                                                          • OleInitialize.OLE32 ref: 00CA1388
                                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 00CE24AB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 1986988660-0
                                                          • Opcode ID: 2272a2c3909c30b5bbe0bac8a0e03017cccb708182b7b659ce58ebbf39124178
                                                          • Instruction ID: 54032aad866597610aa886c5944869049180585a9c3074a6d1aabb101b0a6b9b
                                                          • Opcode Fuzzy Hash: 2272a2c3909c30b5bbe0bac8a0e03017cccb708182b7b659ce58ebbf39124178
                                                          • Instruction Fuzzy Hash: C07199BC9213019EC388EF7DA8466993AF5FB89348B58832A940ED7361FB304484DF71
                                                          APIs
                                                          • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 00CA556D
                                                          • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 00CA557D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: 01b49185336fbaf8f6fdd9e949e52c30821bff2df30d8648025d4d6fc7cd94bf
                                                          • Instruction ID: 38b698a00f03c3b26074ce7f48c0a7abdc7ef5c5a86912c2a6657f00e3af2553
                                                          • Opcode Fuzzy Hash: 01b49185336fbaf8f6fdd9e949e52c30821bff2df30d8648025d4d6fc7cd94bf
                                                          • Instruction Fuzzy Hash: DF315D71A00A0AFFDB14CF68C880B99B7B6FB48718F14C629E91997240D771FE94DB90
                                                          APIs
                                                          • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00CD85CC,?,00D68CC8,0000000C), ref: 00CD8704
                                                          • GetLastError.KERNEL32(?,00CD85CC,?,00D68CC8,0000000C), ref: 00CD870E
                                                          • __dosmaperr.LIBCMT ref: 00CD8739
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                                          • String ID:
                                                          • API String ID: 490808831-0
                                                          • Opcode ID: b66575f25cf9d80adb10f1e21809c4085fa74e9dba93cd07b2b691f3933cf16b
                                                          • Instruction ID: 09dc2cca28b36c94b2bff036bf9c6288d960e780a01e005f3f3872c3d69718f1
                                                          • Opcode Fuzzy Hash: b66575f25cf9d80adb10f1e21809c4085fa74e9dba93cd07b2b691f3933cf16b
                                                          • Instruction Fuzzy Hash: 3001613360576026D6246734A845B7E6B498F81774F39011FFB28DB3E2DEB0CDC69260
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00D12CD4,?,?,?,00000004,00000001), ref: 00D12FF2
                                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00D12CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00D13006
                                                          • CloseHandle.KERNEL32(00000000,?,00D12CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00D1300D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleTime
                                                          • String ID:
                                                          • API String ID: 3397143404-0
                                                          • Opcode ID: d75501e1a22511488c282aeff694c26a350b3267da113929c53ac32e89ef18a3
                                                          • Instruction ID: bbe13a0aee2852dc3e6d732f7c61c7ccc979b789dc4d66c62996652b7ff17fd6
                                                          • Opcode Fuzzy Hash: d75501e1a22511488c282aeff694c26a350b3267da113929c53ac32e89ef18a3
                                                          • Instruction Fuzzy Hash: 6EE0863269131077D2301755BC0DFCB3A5CD78AB71F104210F719B51D046A0550153B8
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 00CB17F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: CALL
                                                          • API String ID: 1385522511-4196123274
                                                          • Opcode ID: a438da23fe879d8f27b23ee614df692a723209a847e9e37ee95971194ef0e3f9
                                                          • Instruction ID: 614b49d53bf130771da19a123a7ff1aad2400a89132f6e4faedae1c73197fd93
                                                          • Opcode Fuzzy Hash: a438da23fe879d8f27b23ee614df692a723209a847e9e37ee95971194ef0e3f9
                                                          • Instruction Fuzzy Hash: 6622AB706083419FC714CF25C8A0AAABBF1FF85314F68891DF9968B3A1D731E945DB92
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00D16F6B
                                                            • Part of subcall function 00CA4ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00D71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CA4EFD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad_wcslen
                                                          • String ID: >>>AUTOIT SCRIPT<<<
                                                          • API String ID: 3312870042-2806939583
                                                          • Opcode ID: ba6453cb937b469239d35622e38b78759727587dda7152b5c2550b438091e769
                                                          • Instruction ID: a92f29eb60fa0760139586e2d5dd59a9725842996e251ecc8d63f302c9463d1f
                                                          • Opcode Fuzzy Hash: ba6453cb937b469239d35622e38b78759727587dda7152b5c2550b438091e769
                                                          • Instruction Fuzzy Hash: A5B180315082029FCB14EF24D8919AEB7F5BF95304F04891DF496872A2DF30ED89DBA2
                                                          APIs
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 00CE2C8C
                                                            • Part of subcall function 00CA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CA3A97,?,?,00CA2E7F,?,?,?,00000000), ref: 00CA3AC2
                                                            • Part of subcall function 00CA2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00CA2DC4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen
                                                          • String ID: X
                                                          • API String ID: 779396738-3081909835
                                                          • Opcode ID: 0f9d3798246b517a842a8df4b55cf9828519ec9f9e7e7ea231f2f22d031ba133
                                                          • Instruction ID: 94154f4a640e1a4af54b232b5783fc2c9544b9fe45d30c3f3234b6446dba0140
                                                          • Opcode Fuzzy Hash: 0f9d3798246b517a842a8df4b55cf9828519ec9f9e7e7ea231f2f22d031ba133
                                                          • Instruction Fuzzy Hash: CB219371A002989BDB05DF99C845BEE7BFCAF49308F004059E505F7341DBB49A899BA1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock
                                                          • String ID: EA06
                                                          • API String ID: 2638373210-3962188686
                                                          • Opcode ID: 712d8b101d7cf73b4b654876cdeea894865cf68b8b905bd095951be20993ca19
                                                          • Instruction ID: 9865faf2078b55f16e22ed3f31266f27e9575bbb89d4eb0819a380c0d8c6eb79
                                                          • Opcode Fuzzy Hash: 712d8b101d7cf73b4b654876cdeea894865cf68b8b905bd095951be20993ca19
                                                          • Instruction Fuzzy Hash: F501B5729442587EEF28C7A8C856FFEBBF89B05301F00455EE192D21C1E5B5E6189B60
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00CA3908
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: 2bedd2593384fb7d197e07a807c869b3ee78789daca2241a310edf1c12046245
                                                          • Instruction ID: 340dacf86898e224f3e3c9b0d030e95968ca23ab199fc56772e5d2a25eed2789
                                                          • Opcode Fuzzy Hash: 2bedd2593384fb7d197e07a807c869b3ee78789daca2241a310edf1c12046245
                                                          • Instruction Fuzzy Hash: 383180705043419FD720DF64D895797BBE8FB49708F00092EF599D7390E775AA44CB62
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00CA949C,?,00008000), ref: 00CA5773
                                                          • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,00CA949C,?,00008000), ref: 00CE4052
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: ac80a9ab2b6d599835fdea28b5749895f34a3f4b828f685e401d1fee68a4508c
                                                          • Instruction ID: af12e4e60163be3c64bee3292c657f50ff8fa0c5612c875cb9659b16d2e0331a
                                                          • Opcode Fuzzy Hash: ac80a9ab2b6d599835fdea28b5749895f34a3f4b828f685e401d1fee68a4508c
                                                          • Instruction Fuzzy Hash: 19015231145325BAE3315A2ADC0EF977F98EF067B4F14C310BAACAA1E0D7B45954DB90
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000002,?,?,?,?,00CA9879,?,?,?), ref: 00CA6E33
                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,?,?,?,00CA9879,?,?,?), ref: 00CA6E69
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide
                                                          • String ID:
                                                          • API String ID: 626452242-0
                                                          • Opcode ID: 2acab0a1ec8cc11bddbd3a18b9176b995728f99e5e1b63753016c01e38bcd159
                                                          • Instruction ID: 4a9e5df6da3c32ecba72d9a6f3ded9234a3fefc349228a204cac2905b1e7efd5
                                                          • Opcode Fuzzy Hash: 2acab0a1ec8cc11bddbd3a18b9176b995728f99e5e1b63753016c01e38bcd159
                                                          • Instruction Fuzzy Hash: DA01D4713002017FEB196BB99C0BF7F7AADDB85300F14003DB106DA2E1E960AD00A630
                                                          APIs
                                                            • Part of subcall function 00F508E0: GetFileAttributesW.KERNELBASE(?), ref: 00F508EB
                                                          • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00F5119F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460557566.0000000000F50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_f50000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AttributesCreateDirectoryFile
                                                          • String ID:
                                                          • API String ID: 3401506121-0
                                                          • Opcode ID: 5468e61e16de3a673499f63b67702db3409f66859a3166e7a959fa09b0ce8f4e
                                                          • Instruction ID: cf3d81d9180ce80da999699f2badbbfb5d41356cf4c2035d102b229c975e6fbf
                                                          • Opcode Fuzzy Hash: 5468e61e16de3a673499f63b67702db3409f66859a3166e7a959fa09b0ce8f4e
                                                          • Instruction Fuzzy Hash: 49518731A1020997DF14EFA0CD55BEF7379EF58301F0045A9AA09E7180EB79AB48CBA5
                                                          APIs
                                                            • Part of subcall function 00CA4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00CA4EDD,?,00D71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CA4E9C
                                                            • Part of subcall function 00CA4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00CA4EAE
                                                            • Part of subcall function 00CA4E90: FreeLibrary.KERNEL32(00000000,?,?,00CA4EDD,?,00D71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CA4EC0
                                                          • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00D71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CA4EFD
                                                            • Part of subcall function 00CA4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00CE3CDE,?,00D71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CA4E62
                                                            • Part of subcall function 00CA4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00CA4E74
                                                            • Part of subcall function 00CA4E59: FreeLibrary.KERNEL32(00000000,?,?,00CE3CDE,?,00D71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CA4E87
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$AddressFreeProc
                                                          • String ID:
                                                          • API String ID: 2632591731-0
                                                          • Opcode ID: 67b6f3ed7be25d5621f7666420ef07018edbb46c2c53fbc7c0078e0656aad168
                                                          • Instruction ID: 9912364e94fa306e3394ebb9f403862c877fcd44b19db9d21a481c6ffdf86861
                                                          • Opcode Fuzzy Hash: 67b6f3ed7be25d5621f7666420ef07018edbb46c2c53fbc7c0078e0656aad168
                                                          • Instruction Fuzzy Hash: F811E732610206AECB18ABA5DC06FADB7A59F81714F20842DF552B71C1DEB1AE45A760
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: 517608472ca71d8fd715736d144a4877f4f8d7f6c3065a3a28b6688149758821
                                                          • Instruction ID: f849ac841ef32f91c291cdda71be5466d358a1e651e9b4b61425ea5d1722ad05
                                                          • Opcode Fuzzy Hash: 517608472ca71d8fd715736d144a4877f4f8d7f6c3065a3a28b6688149758821
                                                          • Instruction Fuzzy Hash: 8511187590420AAFCB05DF58E941A9F7BF5FF48314F10405AF918AB312DB31EA15CBA5
                                                          APIs
                                                          • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,00CA543F,?,00010000,00000000,00000000,00000000,00000000), ref: 00CA9A9C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FileRead
                                                          • String ID:
                                                          • API String ID: 2738559852-0
                                                          • Opcode ID: 4523321820cca985d3b08c57969afeeeb43e61538b63eef6175e4de3bc815e15
                                                          • Instruction ID: b7d85d16fbcd4e982ddda5bdeaab7a851b51402d3863e3aea280a9c12d8287a1
                                                          • Opcode Fuzzy Hash: 4523321820cca985d3b08c57969afeeeb43e61538b63eef6175e4de3bc815e15
                                                          • Instruction Fuzzy Hash: D0114C312047069FD720CF16C882BA6B7F9EF45758F14C42EE5AB86651C770AD45EB60
                                                          APIs
                                                            • Part of subcall function 00CD4C7D: RtlAllocateHeap.NTDLL(00000008,00CA1129,00000000,?,00CD2E29,00000001,00000364,?,?,?,00CCF2DE,00CD3863,00D71444,?,00CBFDF5,?), ref: 00CD4CBE
                                                          • _free.LIBCMT ref: 00CD506C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction ID: 8027b9d558863091732c92e195847d1970dedc5b1329384418793bec94e9ee61
                                                          • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction Fuzzy Hash: AC0126722047046BE3218E659881A5AFBECFB89370F25051EE294833C0EA30A905C6B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction ID: 93ab542fed98b12c4feb0f467adf10fce37e101716b445e7020471521c490bcf
                                                          • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction Fuzzy Hash: 2EF0F432521A18D7C6313A7ACC05F9A339C9F63330F10072EF621922D2DB74E906A6A5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID:
                                                          • API String ID: 176396367-0
                                                          • Opcode ID: e5ae0284a8e1c74d5c21a40028d27b23a0e0331802692773227312db900d97bb
                                                          • Instruction ID: 503601a6138ceeda759ba81596cee130d77739bdfa83048d0eae1757846647b1
                                                          • Opcode Fuzzy Hash: e5ae0284a8e1c74d5c21a40028d27b23a0e0331802692773227312db900d97bb
                                                          • Instruction Fuzzy Hash: 16F0C8B36006116ED7149F39DC07FA7BB98EB44760F10852EF619CB2D1DB31E51097A0
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000008,00CA1129,00000000,?,00CD2E29,00000001,00000364,?,?,?,00CCF2DE,00CD3863,00D71444,?,00CBFDF5,?), ref: 00CD4CBE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 6fb95648a456e4b801c73f792273babacaff3b658f407f29a64b62eda623f0be
                                                          • Instruction ID: 9ff0f6fa4f846b7597f77e728e944781f53545768b99ccd6d2f1a1bc6d619227
                                                          • Opcode Fuzzy Hash: 6fb95648a456e4b801c73f792273babacaff3b658f407f29a64b62eda623f0be
                                                          • Instruction Fuzzy Hash: 7DF0E93172222467DB295F66DC05F5A3789BFD17A1B15811BFB29EA380CB70D90196E0
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,?,00D71444,?,00CBFDF5,?,?,00CAA976,00000010,00D71440,00CA13FC,?,00CA13C6,?,00CA1129), ref: 00CD3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 9bbffe3c9b4482090ee36f780f49a80b90c1cf6d0250ad88ed9aaf8c380e65da
                                                          • Instruction ID: 3c18f9799b70245a11804a227fcb8014105e5330f95af80cd13a3ed9c8137507
                                                          • Opcode Fuzzy Hash: 9bbffe3c9b4482090ee36f780f49a80b90c1cf6d0250ad88ed9aaf8c380e65da
                                                          • Instruction Fuzzy Hash: 71E0E5312003A456D7212667DC00F9A374AAB427B0F09012BFE24D67C0DB50DF01B2F2
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,00D71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CA4F6D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: acacbfe443510a57cbf31fd96ffd18d6e6ec3053398acfd5055ab84e88300eee
                                                          • Instruction ID: 360abd2ee178dcfba583855524182e7571c18ba082a4cb405ec391100ff12bb8
                                                          • Opcode Fuzzy Hash: acacbfe443510a57cbf31fd96ffd18d6e6ec3053398acfd5055ab84e88300eee
                                                          • Instruction Fuzzy Hash: 5BF03971105752CFDB389FA5D890822BBE4AF5632D320997EE1EA82621C7B19844EF51
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00CA2DC4
                                                            • Part of subcall function 00CA6B57: _wcslen.LIBCMT ref: 00CA6B6A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_wcslen
                                                          • String ID:
                                                          • API String ID: 541455249-0
                                                          • Opcode ID: 3c8fdf593d830b4a48727aa77bc32dadc1bab160bf9812b944d391fde7befad5
                                                          • Instruction ID: c75159b90437ab19d606c36d68b0c49bdc82ba737e5877443bfdfb1ed12bcc8a
                                                          • Opcode Fuzzy Hash: 3c8fdf593d830b4a48727aa77bc32dadc1bab160bf9812b944d391fde7befad5
                                                          • Instruction Fuzzy Hash: 72E0C276A002245BCB21E7989C06FEA77EDDFC8790F0800B1FD09E7248DA70AD8096A0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock
                                                          • String ID:
                                                          • API String ID: 2638373210-0
                                                          • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                          • Instruction ID: 458b47a68a8a100dff8ca85638edac0fb0acb96541dd2f7e7a051260c87dbaac
                                                          • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                          • Instruction Fuzzy Hash: 90E048B06097005FDF395A28B8517F677D49F49300F04045EF59B82252E5736855865D
                                                          APIs
                                                            • Part of subcall function 00CA3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00CA3908
                                                            • Part of subcall function 00CAD731: GetInputState.USER32 ref: 00CAD807
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00CA2B6B
                                                            • Part of subcall function 00CA30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00CA314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                          • String ID:
                                                          • API String ID: 3667716007-0
                                                          • Opcode ID: 4041dd46524563b8be07acb20faf0e332e1d8b68d0b35b6d04f93821b286b2b0
                                                          • Instruction ID: 0d1c2a78e5813a545ea6f2909ea8c270e99392706b9bafdb51f6b872948d8e02
                                                          • Opcode Fuzzy Hash: 4041dd46524563b8be07acb20faf0e332e1d8b68d0b35b6d04f93821b286b2b0
                                                          • Instruction Fuzzy Hash: 53E0262230028607C608BB38A8264BDA349CBD335DF40153EF047832A2DE2446455321
                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 00F508EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460557566.0000000000F50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_f50000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                          • Instruction ID: 9d30e7a52f0a4b478abeaecf45531163e0b1c5408d06da268e890344d2ca5829
                                                          • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                          • Instruction Fuzzy Hash: 67E0867190520CDBD710CBB88814AA977A4D704322F104654EE15C3281D930CD44B698
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,00000000,?,00CE0704,?,?,00000000,?,00CE0704,00000000,0000000C), ref: 00CE03B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: ac93ffc9345b96b0bd5d01fe81fefae57dd35afa5012a91119cc6f8af98ad5ad
                                                          • Instruction ID: c6e7d4edb44bd459e0938956ed05e221a4429cd43705fe1294d43f5370eec8d3
                                                          • Opcode Fuzzy Hash: ac93ffc9345b96b0bd5d01fe81fefae57dd35afa5012a91119cc6f8af98ad5ad
                                                          • Instruction Fuzzy Hash: B2D06C3205020DBBDF028F84DD06EDA3BAAFB48714F014000BE18A6120C732E821AB90
                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 00F508BB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460557566.0000000000F50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_f50000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                          • Instruction ID: af135aab674a08e52154f987af3a7d6f828b54f2c2fcacda01898d3152cd2c0c
                                                          • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                          • Instruction Fuzzy Hash: 13D05E3190620CABCB10CAA49804A9A73A8AB04322F104764EE1597280DA319948A790
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00CA1CBC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem
                                                          • String ID:
                                                          • API String ID: 3098949447-0
                                                          • Opcode ID: a5dca6a1dd0f4cc68294065b10d30d443789fb6c7b67a1893e0d6898eda5ef97
                                                          • Instruction ID: cf7a8a48fe4a40550f5c48fb5f297a564ea801b99605ea061d6ad5a1f9361af9
                                                          • Opcode Fuzzy Hash: a5dca6a1dd0f4cc68294065b10d30d443789fb6c7b67a1893e0d6898eda5ef97
                                                          • Instruction Fuzzy Hash: 21C0923B290304EFF2148B94BC4BF207764A348B00F048001F64DE9BE3E3A228A0EB70
                                                          APIs
                                                            • Part of subcall function 00CA5745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00CA949C,?,00008000), ref: 00CA5773
                                                          • GetLastError.KERNEL32(00000002,00000000), ref: 00D176DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateErrorFileLast
                                                          • String ID:
                                                          • API String ID: 1214770103-0
                                                          • Opcode ID: 5e3be00feedf47b65d1e72b39977b3fae0bcd5659e385ce9a9bd6e1b14439b1f
                                                          • Instruction ID: e522b538608aefc33a0550f9bf6473fced56fdba0469cfa2ca7e0a5f501b8fb6
                                                          • Opcode Fuzzy Hash: 5e3be00feedf47b65d1e72b39977b3fae0bcd5659e385ce9a9bd6e1b14439b1f
                                                          • Instruction Fuzzy Hash: F68170306087029FCB14EF28D491BA9B7F1BF89354F08451DF8865B2A2DB30ED85DB62
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: b16129c3e49a96ec156e97a539598fe722d4636b0b6446854af56ef23dec1540
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: 7131DB75A00109DBD718CF69D8809A9FBA5FF49300F2486A9E815CB756D731EEC2CBD0
                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 00F522B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460557566.0000000000F50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_f50000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                          • Instruction ID: 5f777c8e874bdc59fdd1d3645e0cda82911e4837e4a3b70b43b1cf8a82cfd9d0
                                                          • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                          • Instruction Fuzzy Hash: 88E0BF7594010EEFDB00EFA8D5496DE7BB4EF04312F1006A1FD05E7680DB309E549A62
                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 00F522B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460557566.0000000000F50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_f50000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction ID: 27750e97668d80b6ad7619c521b2bb337fc586df55405d1d3c2b9e92120aa84a
                                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction Fuzzy Hash: 28E0E67594010EEFDB00EFB8D54969E7FB4EF04302F100261FD05E2280D6309D509A72
                                                          APIs
                                                            • Part of subcall function 00CB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CB9BB2
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00D3961A
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D3965B
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00D3969F
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D396C9
                                                          • SendMessageW.USER32 ref: 00D396F2
                                                          • GetKeyState.USER32(00000011), ref: 00D3978B
                                                          • GetKeyState.USER32(00000009), ref: 00D39798
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D397AE
                                                          • GetKeyState.USER32(00000010), ref: 00D397B8
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D397E9
                                                          • SendMessageW.USER32 ref: 00D39810
                                                          • SendMessageW.USER32(?,00001030,?,00D37E95), ref: 00D39918
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00D3992E
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00D39941
                                                          • SetCapture.USER32(?), ref: 00D3994A
                                                          • ClientToScreen.USER32(?,?), ref: 00D399AF
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00D399BC
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00D399D6
                                                          • ReleaseCapture.USER32 ref: 00D399E1
                                                          • GetCursorPos.USER32(?), ref: 00D39A19
                                                          • ScreenToClient.USER32(?,?), ref: 00D39A26
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00D39A80
                                                          • SendMessageW.USER32 ref: 00D39AAE
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00D39AEB
                                                          • SendMessageW.USER32 ref: 00D39B1A
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00D39B3B
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00D39B4A
                                                          • GetCursorPos.USER32(?), ref: 00D39B68
                                                          • ScreenToClient.USER32(?,?), ref: 00D39B75
                                                          • GetParent.USER32(?), ref: 00D39B93
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00D39BFA
                                                          • SendMessageW.USER32 ref: 00D39C2B
                                                          • ClientToScreen.USER32(?,?), ref: 00D39C84
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00D39CB4
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00D39CDE
                                                          • SendMessageW.USER32 ref: 00D39D01
                                                          • ClientToScreen.USER32(?,?), ref: 00D39D4E
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00D39D82
                                                            • Part of subcall function 00CB9944: GetWindowLongW.USER32(?,000000EB), ref: 00CB9952
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D39E05
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                          • String ID: @GUI_DRAGID$@U=u$F
                                                          • API String ID: 3429851547-1007936534
                                                          • Opcode ID: 62846337ff8aad47e5a34877a1725dbb4e0b026ceb1f203a6aa09cb476512d6e
                                                          • Instruction ID: 2920cacada72f44b01cfd09caa680de86f2511781aaa0d014ef65aedf3a7eec7
                                                          • Opcode Fuzzy Hash: 62846337ff8aad47e5a34877a1725dbb4e0b026ceb1f203a6aa09cb476512d6e
                                                          • Instruction Fuzzy Hash: DF42AA35205301AFDB24CF28CCA5AAABBE5FF49310F180619F699D72A1D7B1E851CF61
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00D348F3
                                                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00D34908
                                                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00D34927
                                                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00D3494B
                                                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00D3495C
                                                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00D3497B
                                                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00D349AE
                                                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00D349D4
                                                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00D34A0F
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00D34A56
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00D34A7E
                                                          • IsMenu.USER32(?), ref: 00D34A97
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D34AF2
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D34B20
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D34B94
                                                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00D34BE3
                                                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00D34C82
                                                          • wsprintfW.USER32 ref: 00D34CAE
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00D34CC9
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00D34CF1
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00D34D13
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00D34D33
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00D34D5A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                          • String ID: %d/%02d/%02d$@U=u
                                                          • API String ID: 4054740463-2764005415
                                                          • Opcode ID: c2bd7d2ce344cdb884c7b793e1b5cd290a426a4e6da21a3a21ef96aaad5a3b43
                                                          • Instruction ID: b40f60e5fa4656143811ff181a6b1095ccd0ec246c02ee1fb6b29550ef4c3ad9
                                                          • Opcode Fuzzy Hash: c2bd7d2ce344cdb884c7b793e1b5cd290a426a4e6da21a3a21ef96aaad5a3b43
                                                          • Instruction Fuzzy Hash: CE12D071600354ABEB248F28DC49FAE7BF8EF45710F184129F515EA2E1DB78E941CB60
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00CBF998
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CFF474
                                                          • IsIconic.USER32(00000000), ref: 00CFF47D
                                                          • ShowWindow.USER32(00000000,00000009), ref: 00CFF48A
                                                          • SetForegroundWindow.USER32(00000000), ref: 00CFF494
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00CFF4AA
                                                          • GetCurrentThreadId.KERNEL32 ref: 00CFF4B1
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00CFF4BD
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00CFF4CE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00CFF4D6
                                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00CFF4DE
                                                          • SetForegroundWindow.USER32(00000000), ref: 00CFF4E1
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CFF4F6
                                                          • keybd_event.USER32(00000012,00000000), ref: 00CFF501
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CFF50B
                                                          • keybd_event.USER32(00000012,00000000), ref: 00CFF510
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CFF519
                                                          • keybd_event.USER32(00000012,00000000), ref: 00CFF51E
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CFF528
                                                          • keybd_event.USER32(00000012,00000000), ref: 00CFF52D
                                                          • SetForegroundWindow.USER32(00000000), ref: 00CFF530
                                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00CFF557
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 212bcfb8870ce12baa89b785c525e378db48320f53a9ae95dd3977714b0503eb
                                                          • Instruction ID: 081399163b3d8fd074d740167a5402e8651bb6a45bbb19d4a3c5648b4e93adcf
                                                          • Opcode Fuzzy Hash: 212bcfb8870ce12baa89b785c525e378db48320f53a9ae95dd3977714b0503eb
                                                          • Instruction Fuzzy Hash: B4313E71A50318BBEB206BB55C4AFBF7E6CEB44B50F141069FA01F62D1C6B19901ABB1
                                                          APIs
                                                            • Part of subcall function 00D016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D0170D
                                                            • Part of subcall function 00D016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D0173A
                                                            • Part of subcall function 00D016C3: GetLastError.KERNEL32 ref: 00D0174A
                                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00D01286
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00D012A8
                                                          • CloseHandle.KERNEL32(?), ref: 00D012B9
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00D012D1
                                                          • GetProcessWindowStation.USER32 ref: 00D012EA
                                                          • SetProcessWindowStation.USER32(00000000), ref: 00D012F4
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00D01310
                                                            • Part of subcall function 00D010BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00D011FC), ref: 00D010D4
                                                            • Part of subcall function 00D010BF: CloseHandle.KERNEL32(?,?,00D011FC), ref: 00D010E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                          • String ID: $default$winsta0
                                                          • API String ID: 22674027-1027155976
                                                          • Opcode ID: 658532e4a46559da3670e6569ec38ca81e2db014e21ed9e6ece6eaeccb961683
                                                          • Instruction ID: 08b3faed44d2c28a640f62ace9d6701c6e1a4f0c5cf7e74f569852876c20989f
                                                          • Opcode Fuzzy Hash: 658532e4a46559da3670e6569ec38ca81e2db014e21ed9e6ece6eaeccb961683
                                                          • Instruction Fuzzy Hash: 2C816575900249ABDF219FA4DC49BEE7BB9EF04704F184129F918F62A0C771DA58CB30
                                                          APIs
                                                            • Part of subcall function 00D010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D01114
                                                            • Part of subcall function 00D010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00D00B9B,?,?,?), ref: 00D01120
                                                            • Part of subcall function 00D010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00D00B9B,?,?,?), ref: 00D0112F
                                                            • Part of subcall function 00D010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00D00B9B,?,?,?), ref: 00D01136
                                                            • Part of subcall function 00D010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D0114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00D00BCC
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00D00C00
                                                          • GetLengthSid.ADVAPI32(?), ref: 00D00C17
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00D00C51
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00D00C6D
                                                          • GetLengthSid.ADVAPI32(?), ref: 00D00C84
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00D00C8C
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00D00C93
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00D00CB4
                                                          • CopySid.ADVAPI32(00000000), ref: 00D00CBB
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00D00CEA
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00D00D0C
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00D00D1E
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D00D45
                                                          • HeapFree.KERNEL32(00000000), ref: 00D00D4C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D00D55
                                                          • HeapFree.KERNEL32(00000000), ref: 00D00D5C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D00D65
                                                          • HeapFree.KERNEL32(00000000), ref: 00D00D6C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00D00D78
                                                          • HeapFree.KERNEL32(00000000), ref: 00D00D7F
                                                            • Part of subcall function 00D01193: GetProcessHeap.KERNEL32(00000008,00D00BB1,?,00000000,?,00D00BB1,?), ref: 00D011A1
                                                            • Part of subcall function 00D01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00D00BB1,?), ref: 00D011A8
                                                            • Part of subcall function 00D01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00D00BB1,?), ref: 00D011B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 357ae1b1a9afac5bb23ae605c8341ae082ba9caba71e0868cc7b38781d000da4
                                                          • Instruction ID: a04c49032243b9394daad2c2cc587767cc46d739c82ddfb01e1eaa454080618d
                                                          • Opcode Fuzzy Hash: 357ae1b1a9afac5bb23ae605c8341ae082ba9caba71e0868cc7b38781d000da4
                                                          • Instruction Fuzzy Hash: 1D711676A0020ABBDF10DFA4DC45BEEBBBDAF04310F184525E919E6291D775AA05CBB0
                                                          APIs
                                                          • OpenClipboard.USER32(00D3CC08), ref: 00D1EB29
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00D1EB37
                                                          • GetClipboardData.USER32(0000000D), ref: 00D1EB43
                                                          • CloseClipboard.USER32 ref: 00D1EB4F
                                                          • GlobalLock.KERNEL32(00000000), ref: 00D1EB87
                                                          • CloseClipboard.USER32 ref: 00D1EB91
                                                          • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00D1EBBC
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00D1EBC9
                                                          • GetClipboardData.USER32(00000001), ref: 00D1EBD1
                                                          • GlobalLock.KERNEL32(00000000), ref: 00D1EBE2
                                                          • GlobalUnlock.KERNEL32(00000000,?), ref: 00D1EC22
                                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 00D1EC38
                                                          • GetClipboardData.USER32(0000000F), ref: 00D1EC44
                                                          • GlobalLock.KERNEL32(00000000), ref: 00D1EC55
                                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00D1EC77
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00D1EC94
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00D1ECD2
                                                          • GlobalUnlock.KERNEL32(00000000,?,?), ref: 00D1ECF3
                                                          • CountClipboardFormats.USER32 ref: 00D1ED14
                                                          • CloseClipboard.USER32 ref: 00D1ED59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                          • String ID:
                                                          • API String ID: 420908878-0
                                                          • Opcode ID: 000b56a6d723c015785c530dd1d4cf6f6320c049da273b3866189cb262bdcce0
                                                          • Instruction ID: 96c52d07a82a68100b43a27375df346871c3805709661b0aa883ffd8debb84ee
                                                          • Opcode Fuzzy Hash: 000b56a6d723c015785c530dd1d4cf6f6320c049da273b3866189cb262bdcce0
                                                          • Instruction Fuzzy Hash: 9261C135204302AFD300EF24E889FAA77A4EF85714F085519F856D72A2DF71D985DBB2
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00D169BE
                                                          • FindClose.KERNEL32(00000000), ref: 00D16A12
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D16A4E
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D16A75
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D16AB2
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D16ADF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                          • API String ID: 3830820486-3289030164
                                                          • Opcode ID: adb64259059b659c742cc3d1f9dd22bed80c3f218752d731413e8ba32c14d13f
                                                          • Instruction ID: 55204b5afb840e6d5df06157a92e626db567aba1698a7ba8f6861e0bc1eed585
                                                          • Opcode Fuzzy Hash: adb64259059b659c742cc3d1f9dd22bed80c3f218752d731413e8ba32c14d13f
                                                          • Instruction Fuzzy Hash: C6D14F72508301AFC710EBA4DC86EABB7ECEF89708F04491DF585D6291EB74DA44DB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 00D19663
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00D196A1
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00D196BB
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00D196D3
                                                          • FindClose.KERNEL32(00000000), ref: 00D196DE
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00D196FA
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00D1974A
                                                          • SetCurrentDirectoryW.KERNEL32(00D66B7C), ref: 00D19768
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D19772
                                                          • FindClose.KERNEL32(00000000), ref: 00D1977F
                                                          • FindClose.KERNEL32(00000000), ref: 00D1978F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1409584000-438819550
                                                          • Opcode ID: f2134b68af531f0e0c20300495a79e312751aa696fbf965b1b59ce5619feb879
                                                          • Instruction ID: f4ca51ebe6ad5e0191b0631743f7a0607aba82da63e58f92c14d1f9f00e49080
                                                          • Opcode Fuzzy Hash: f2134b68af531f0e0c20300495a79e312751aa696fbf965b1b59ce5619feb879
                                                          • Instruction Fuzzy Hash: A831A036650219BFDB14AFB4EC69ADEB7ACAF09321F144165F815E21E0DB30DA84CB34
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 00D197BE
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00D19819
                                                          • FindClose.KERNEL32(00000000), ref: 00D19824
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00D19840
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00D19890
                                                          • SetCurrentDirectoryW.KERNEL32(00D66B7C), ref: 00D198AE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D198B8
                                                          • FindClose.KERNEL32(00000000), ref: 00D198C5
                                                          • FindClose.KERNEL32(00000000), ref: 00D198D5
                                                            • Part of subcall function 00D0DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00D0DB00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 2640511053-438819550
                                                          • Opcode ID: c2bced4d5ab484b80a8f97ae996867f45b612a68c5d68022fc20899939aa6dce
                                                          • Instruction ID: 8502e3deeafe49d749ad17cdb6ffae921503a83e2ec7f43cd7421508642a7212
                                                          • Opcode Fuzzy Hash: c2bced4d5ab484b80a8f97ae996867f45b612a68c5d68022fc20899939aa6dce
                                                          • Instruction Fuzzy Hash: 333183325406197EDB14AFB4FC68ADEB7ACAF06320F144166E854E2190DF31D9C5CB74
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 00D18257
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D18267
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00D18273
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00D18310
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00D18324
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00D18356
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00D1838C
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00D18395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local$System
                                                          • String ID: *.*
                                                          • API String ID: 1464919966-438819550
                                                          • Opcode ID: c1ba882cdce423c6a6b3c5fe387b79f1d94c1745b68be5336783d58ac74a4520
                                                          • Instruction ID: c9aba1711a3798c3bbec89af6614ab982691ac94c76cb64be031aa57cb7c9910
                                                          • Opcode Fuzzy Hash: c1ba882cdce423c6a6b3c5fe387b79f1d94c1745b68be5336783d58ac74a4520
                                                          • Instruction Fuzzy Hash: F2617CB2504305AFC710EF64D88099EB3E8FF89314F08891EF999D7251DB31E945DBA2
                                                          APIs
                                                            • Part of subcall function 00CA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CA3A97,?,?,00CA2E7F,?,?,?,00000000), ref: 00CA3AC2
                                                            • Part of subcall function 00D0E199: GetFileAttributesW.KERNEL32(?,00D0CF95), ref: 00D0E19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00D0D122
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00D0D1DD
                                                          • MoveFileW.KERNEL32(?,?), ref: 00D0D1F0
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00D0D20D
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D0D237
                                                            • Part of subcall function 00D0D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00D0D21C,?,?), ref: 00D0D2B2
                                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 00D0D253
                                                          • FindClose.KERNEL32(00000000), ref: 00D0D264
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 1946585618-1173974218
                                                          • Opcode ID: a1aec334c2bcd553ad6c52c74d2285ad5cad90f5fa251e6c88f2db3dcfb95c26
                                                          • Instruction ID: c316d0d8c1ff471e972ae7a3ec0715f9bd4063c8938378aa48ab369be7ada884
                                                          • Opcode Fuzzy Hash: a1aec334c2bcd553ad6c52c74d2285ad5cad90f5fa251e6c88f2db3dcfb95c26
                                                          • Instruction Fuzzy Hash: 72616F31C0125E9BCF05EBE0D952AEDB776AF55304F244166E406771A1EB309F09DB71
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 18c5286a10db868cb7934cdca5f6df4511c9734cb43afb93e3ec33a8d7873d9f
                                                          • Instruction ID: fb6a20a41dc51cca80aeda52755d9cc6675868b88c952a373bd88bfc07e5eb49
                                                          • Opcode Fuzzy Hash: 18c5286a10db868cb7934cdca5f6df4511c9734cb43afb93e3ec33a8d7873d9f
                                                          • Instruction Fuzzy Hash: 17419D35204611AFD310DF25E889B5ABBE5EF44318F18C099E8199B762CB35EC81CBA0
                                                          APIs
                                                            • Part of subcall function 00D016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D0170D
                                                            • Part of subcall function 00D016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D0173A
                                                            • Part of subcall function 00D016C3: GetLastError.KERNEL32 ref: 00D0174A
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 00D0E932
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $ $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-3163812486
                                                          • Opcode ID: d9d93c7851835c1059a4fc2414733463c569c54c706f1edf9e629479b753a238
                                                          • Instruction ID: 52952626cd66fb9239cf90c31fb758c3d617cd1e2c87f6ba5c40ab8d4203a637
                                                          • Opcode Fuzzy Hash: d9d93c7851835c1059a4fc2414733463c569c54c706f1edf9e629479b753a238
                                                          • Instruction Fuzzy Hash: D701D673620311ABEB6467B4AC86BBB735CA714750F194D26FC4AF21D2D5A19C408AB4
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00D21276
                                                          • WSAGetLastError.WSOCK32 ref: 00D21283
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00D212BA
                                                          • WSAGetLastError.WSOCK32 ref: 00D212C5
                                                          • closesocket.WSOCK32(00000000), ref: 00D212F4
                                                          • listen.WSOCK32(00000000,00000005), ref: 00D21303
                                                          • WSAGetLastError.WSOCK32 ref: 00D2130D
                                                          • closesocket.WSOCK32(00000000), ref: 00D2133C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                                          • String ID:
                                                          • API String ID: 540024437-0
                                                          • Opcode ID: 482f8eef6b70cf689ad03b39c181d4659e734cb1764ecb743e6d962587c366a1
                                                          • Instruction ID: 217ca191ddd68a856dab84c078e4690c6f6be5f61a2587b44f6b66ebd1cdb572
                                                          • Opcode Fuzzy Hash: 482f8eef6b70cf689ad03b39c181d4659e734cb1764ecb743e6d962587c366a1
                                                          • Instruction Fuzzy Hash: E9416F35A00211DFD710DF64D485B2ABBE6AF66318F18C198E8569F392C771ED81CBB1
                                                          APIs
                                                          • _free.LIBCMT ref: 00CDB9D4
                                                          • _free.LIBCMT ref: 00CDB9F8
                                                          • _free.LIBCMT ref: 00CDBB7F
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00D43700), ref: 00CDBB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00D7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00CDBC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00D71270,000000FF,?,0000003F,00000000,?), ref: 00CDBC36
                                                          • _free.LIBCMT ref: 00CDBD4B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                          • String ID:
                                                          • API String ID: 314583886-0
                                                          • Opcode ID: 0e02aa7955f514d2a5fa8d2302d3f40d4b37129f5f372b8af3c890d0fd1c0791
                                                          • Instruction ID: d0b40e3e47b42f884505ebc0c2a86031a45b91522b23a518e31d1226751a7121
                                                          • Opcode Fuzzy Hash: 0e02aa7955f514d2a5fa8d2302d3f40d4b37129f5f372b8af3c890d0fd1c0791
                                                          • Instruction Fuzzy Hash: A8C12675904245EFCB209F69CC51BAABBB8EF41310F16419FE6A8D7352EB309E41E760
                                                          APIs
                                                            • Part of subcall function 00CA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CA3A97,?,?,00CA2E7F,?,?,?,00000000), ref: 00CA3AC2
                                                            • Part of subcall function 00D0E199: GetFileAttributesW.KERNEL32(?,00D0CF95), ref: 00D0E19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00D0D420
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00D0D470
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D0D481
                                                          • FindClose.KERNEL32(00000000), ref: 00D0D498
                                                          • FindClose.KERNEL32(00000000), ref: 00D0D4A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: 3c7b5b6f4a0ab0f1c25db6e4bbbda729a0a40184199cc27fa27890c227a2fa15
                                                          • Instruction ID: f27ebc318fa1b25c69cc3f7f0ad458bd507f3ed82c8252e4b3bc21330a2ad68d
                                                          • Opcode Fuzzy Hash: 3c7b5b6f4a0ab0f1c25db6e4bbbda729a0a40184199cc27fa27890c227a2fa15
                                                          • Instruction Fuzzy Hash: 723180310183469FC300EFA4D8969AFB7A8AE92304F444A1EF4D5931E1EB34EA09D773
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 60e0478b12312fce15f87e03ce352cff947b999bc4b982a3ca2f900a1ae2ffb4
                                                          • Instruction ID: eec0c1c873890e31947bc873ed93d50e58d70c8f9b03e305954be7d1cec74961
                                                          • Opcode Fuzzy Hash: 60e0478b12312fce15f87e03ce352cff947b999bc4b982a3ca2f900a1ae2ffb4
                                                          • Instruction Fuzzy Hash: FFC23871E086288BDB25DE28DD407EAB7B5FB49304F1541EBD95EE7240E774AE828F40
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00D164DC
                                                          • CoInitialize.OLE32(00000000), ref: 00D16639
                                                          • CoCreateInstance.OLE32(00D3FCF8,00000000,00000001,00D3FB68,?), ref: 00D16650
                                                          • CoUninitialize.OLE32 ref: 00D168D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: a3475eb5bee0fac351a1d2280a5f03cf9be92f8cc0fecd0c33d696b1829034d5
                                                          • Instruction ID: 4f2a8e6ae66ab3f4a4286010f9276c51905c09c72f4ef6dd44eb0e072962a765
                                                          • Opcode Fuzzy Hash: a3475eb5bee0fac351a1d2280a5f03cf9be92f8cc0fecd0c33d696b1829034d5
                                                          • Instruction Fuzzy Hash: E3D14A71508301AFD304EF24D881EABB7E9FF95708F04496DF5958B291DB70E949CBA2
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 00D222E8
                                                            • Part of subcall function 00D1E4EC: GetWindowRect.USER32(?,?), ref: 00D1E504
                                                          • GetDesktopWindow.USER32 ref: 00D22312
                                                          • GetWindowRect.USER32(00000000), ref: 00D22319
                                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00D22355
                                                          • GetCursorPos.USER32(?), ref: 00D22381
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00D223DF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                          • String ID:
                                                          • API String ID: 2387181109-0
                                                          • Opcode ID: 4724706a23424810425ff1a490b94de4488a698bf3f4088ddda3fef10be7d720
                                                          • Instruction ID: d88d1aa177515c1283d2f3db4495b14a0d6f273c194dab76d2293c94a17de0cf
                                                          • Opcode Fuzzy Hash: 4724706a23424810425ff1a490b94de4488a698bf3f4088ddda3fef10be7d720
                                                          • Instruction Fuzzy Hash: 7431C272504325AFD720DF54D845BABB7A9FF94314F040A1DF985E7291DB34E908CBA2
                                                          APIs
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00D19B78
                                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00D19C8B
                                                            • Part of subcall function 00D13874: GetInputState.USER32 ref: 00D138CB
                                                            • Part of subcall function 00D13874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D13966
                                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00D19BA8
                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00D19C75
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                          • String ID: *.*
                                                          • API String ID: 1972594611-438819550
                                                          • Opcode ID: 7c0ef8f15e3c3492ca38c9f338f6cc06a21b1667b4f1885b6f3a774705a9c215
                                                          • Instruction ID: c4a9dce84c195563b5bab1157ee3757ad8cda2edc77e62c75eac5b3817d1728a
                                                          • Opcode Fuzzy Hash: 7c0ef8f15e3c3492ca38c9f338f6cc06a21b1667b4f1885b6f3a774705a9c215
                                                          • Instruction Fuzzy Hash: 9C41607194420AAFCF14DF64D9A9AEEBBB9EF05310F244155F845A3291EB309E84DFB0
                                                          APIs
                                                            • Part of subcall function 00CB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CB9BB2
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00CB9A4E
                                                          • GetSysColor.USER32(0000000F), ref: 00CB9B23
                                                          • SetBkColor.GDI32(?,00000000), ref: 00CB9B36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Color$LongProcWindow
                                                          • String ID:
                                                          • API String ID: 3131106179-0
                                                          • Opcode ID: 04dec0f553742ffebe11208bda07d778d1906a3cf1422adb42410b8d3d243c0e
                                                          • Instruction ID: e64ac892bf540f66ce9744ef51485f9576af5ae8d55b47489433d00ed39aeb98
                                                          • Opcode Fuzzy Hash: 04dec0f553742ffebe11208bda07d778d1906a3cf1422adb42410b8d3d243c0e
                                                          • Instruction Fuzzy Hash: C6A13B70118558BEE769AB3D8C99EFB369DDF42340F15030AF322D66A1CA359E41E273
                                                          APIs
                                                            • Part of subcall function 00D2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00D2307A
                                                            • Part of subcall function 00D2304E: _wcslen.LIBCMT ref: 00D2309B
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00D2185D
                                                          • WSAGetLastError.WSOCK32 ref: 00D21884
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00D218DB
                                                          • WSAGetLastError.WSOCK32 ref: 00D218E6
                                                          • closesocket.WSOCK32(00000000), ref: 00D21915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 1601658205-0
                                                          • Opcode ID: 5a438f272463ec5f79b729fcbd56d62dddee06631f92e306c82affc125de2da0
                                                          • Instruction ID: 10bd822651e5adcd9a04c62e3abb6e7bdb7b3677f39e264e22bb799b85ab98dd
                                                          • Opcode Fuzzy Hash: 5a438f272463ec5f79b729fcbd56d62dddee06631f92e306c82affc125de2da0
                                                          • Instruction Fuzzy Hash: 7851D275A00210AFDB10AF24D8C6F6AB7E5AB55718F188098F919AF3C3C771ED419BA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: f1ff54f7512fa6762e8086c32d6bddb323466bc30f70425239e12e51b599a4ef
                                                          • Instruction ID: 9de2a1cbe65ab7e896ed9a5f046da4cd1cd0083af9f8efddbfd85dc7a0abe08f
                                                          • Opcode Fuzzy Hash: f1ff54f7512fa6762e8086c32d6bddb323466bc30f70425239e12e51b599a4ef
                                                          • Instruction Fuzzy Hash: B421A1357402125FD7208F2AD894B6ABBA5EF85315F1DA068E84ADB351CB71EC42CBB0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-1546025612
                                                          • Opcode ID: 801d12fae94481a04aa0c2f715024017ce38e816143a328c33dc27311f6c7ef1
                                                          • Instruction ID: e9ec3fbb37d1f6e4e19c7e0400e69d194b0fe3d50f8f2c3a5a4c5c6be0692ff7
                                                          • Opcode Fuzzy Hash: 801d12fae94481a04aa0c2f715024017ce38e816143a328c33dc27311f6c7ef1
                                                          • Instruction Fuzzy Hash: 69A2A270E0065ACBDF24CF59C8407AEB7B1FF55318F2481AAE825A7285DB709E85CF90
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00D2A6AC
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00D2A6BA
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00D2A79C
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D2A7AB
                                                            • Part of subcall function 00CBCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00CE3303,?), ref: 00CBCE8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                          • String ID:
                                                          • API String ID: 1991900642-0
                                                          • Opcode ID: 629ea36002070c955586bed68a5432c000f45bed02ed23bce8958272c2bca879
                                                          • Instruction ID: bc074a1bb16904c66819e642838657b8e9713a7bc1a093069bf2008b80c2ef08
                                                          • Opcode Fuzzy Hash: 629ea36002070c955586bed68a5432c000f45bed02ed23bce8958272c2bca879
                                                          • Instruction Fuzzy Hash: 41516F715083119FD710EF24D886A6BBBE8FF89758F04891DF585D72A1EB30D904DBA2
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00D0AAAC
                                                          • SetKeyboardState.USER32(00000080), ref: 00D0AAC8
                                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00D0AB36
                                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00D0AB88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 549d84ad0f8065374132807667064c78cd19e9c81cb111ca6786f64c975b5496
                                                          • Instruction ID: ddc824b20a194a6bb44637fd92c64a0ca64b0a0b88f4a2804cc37eda59504acf
                                                          • Opcode Fuzzy Hash: 549d84ad0f8065374132807667064c78cd19e9c81cb111ca6786f64c975b5496
                                                          • Instruction Fuzzy Hash: 6531F431A40358AEFB35CB6DCC05BFA7BA6EB45320F08421AF599961E1D375C981C772
                                                          APIs
                                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 00D1CE89
                                                          • GetLastError.KERNEL32(?,00000000), ref: 00D1CEEA
                                                          • SetEvent.KERNEL32(?,?,00000000), ref: 00D1CEFE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorEventFileInternetLastRead
                                                          • String ID:
                                                          • API String ID: 234945975-0
                                                          • Opcode ID: 6207da3bbe58b820b1f1056fc774cef1ed33f415a1418147e97fb37c8e2508cc
                                                          • Instruction ID: 40002fd6ae9334ce0fddb6290979a29845f25a5292babcdb814e13ae5d66550a
                                                          • Opcode Fuzzy Hash: 6207da3bbe58b820b1f1056fc774cef1ed33f415a1418147e97fb37c8e2508cc
                                                          • Instruction Fuzzy Hash: 7621BDB1590305ABDB20CFA5E948BA7B7F8EF00314F14541EE546E2251EB74EE858BB4
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00D082AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: b4124e74080c48251451627222c6e9baac0178271c3572fb8e5e530f8e681bcb
                                                          • Instruction ID: bb3ce187f672bc26d224710d74d2b37d6f0dd51dbc7dc689fd17c23897bc4a79
                                                          • Opcode Fuzzy Hash: b4124e74080c48251451627222c6e9baac0178271c3572fb8e5e530f8e681bcb
                                                          • Instruction Fuzzy Hash: AD323474A007059FCB28CF69C481AAAB7F0FF48710B15C56EE49ADB3A1EB70E941DB54
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00D15CC1
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00D15D17
                                                          • FindClose.KERNEL32(?), ref: 00D15D5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 3541575487-0
                                                          • Opcode ID: c7e83e2b5432426115841fe556622fe4a199918be63b71634bfa86a65fef3d5e
                                                          • Instruction ID: fb8b0815948c0b7d8183023a8d9290b33d2c7e25bf25701768648bd6e9d95958
                                                          • Opcode Fuzzy Hash: c7e83e2b5432426115841fe556622fe4a199918be63b71634bfa86a65fef3d5e
                                                          • Instruction Fuzzy Hash: 64519C74604602EFC714CF28E494E96B7E4FF4A314F14855DE99A8B3A1CB34ED84CBA1
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 00CD271A
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00CD2724
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00CD2731
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 417518a70b0746a1542e70f971171a126e5ee1a86e5dbc1cb1a0432b98f4099c
                                                          • Instruction ID: 7d55f51ffc8c1104af997b74e2f5463ab98f000379e0a51ac9773902eff2882e
                                                          • Opcode Fuzzy Hash: 417518a70b0746a1542e70f971171a126e5ee1a86e5dbc1cb1a0432b98f4099c
                                                          • Instruction Fuzzy Hash: F931D57591131CABCB21DF64DC88B9DBBB8AF18310F5041EAE91CA7260E7349F819F54
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00D151DA
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00D15238
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00D152A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: 9838d3aa93960e48ce120e0fde223a2917ce53cd874bc350b5d7ca2189e4bf7e
                                                          • Instruction ID: 1d7e35769ff493ae8ff5a58cc48f5047976166cbef3be474fa5529cb598f21ac
                                                          • Opcode Fuzzy Hash: 9838d3aa93960e48ce120e0fde223a2917ce53cd874bc350b5d7ca2189e4bf7e
                                                          • Instruction Fuzzy Hash: 6B315075A00619EFDB00DF94D884EADBBB4FF49318F088099E805AB396DB75E855CB60
                                                          APIs
                                                            • Part of subcall function 00CBFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00CC0668
                                                            • Part of subcall function 00CBFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00CC0685
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D0170D
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D0173A
                                                          • GetLastError.KERNEL32 ref: 00D0174A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                          • String ID:
                                                          • API String ID: 577356006-0
                                                          • Opcode ID: e5f8a5e235fd6ab005609951fcf5aaf85442e44e61bf402756a6ea854f252168
                                                          • Instruction ID: 4625b65f4e91ac7d027b0508a38aba9e0beb1f718009cf950e72ccba40341fb5
                                                          • Opcode Fuzzy Hash: e5f8a5e235fd6ab005609951fcf5aaf85442e44e61bf402756a6ea854f252168
                                                          • Instruction Fuzzy Hash: 2A1191B2514304AFD7189F64DC86EAAB7B9EB44714B24852EE05697281EB70FC418B30
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00D0D608
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00D0D645
                                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00D0D650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: e10210b3db1ca8a6737d3b28d989b6923322997ee0cc57414e8113f1f55a397e
                                                          • Instruction ID: e72bc8dbf1913c52c0c18d7227eae3639c91aa064d061d2112fa4efa96be8ceb
                                                          • Opcode Fuzzy Hash: e10210b3db1ca8a6737d3b28d989b6923322997ee0cc57414e8113f1f55a397e
                                                          • Instruction Fuzzy Hash: 16113C75E05328BBDB108F959C45FAFBBBCEB45B50F108126F908E7290D6704A058BA1
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00D0168C
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00D016A1
                                                          • FreeSid.ADVAPI32(?), ref: 00D016B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 4b84d0c24b8a1b1c45698c65706b2212f5e6dd950dda721665744d22af329e3d
                                                          • Instruction ID: 278e685827f7c02cec01daf0807bd76eba65b63bedce15adfd1512554a308f17
                                                          • Opcode Fuzzy Hash: 4b84d0c24b8a1b1c45698c65706b2212f5e6dd950dda721665744d22af329e3d
                                                          • Instruction Fuzzy Hash: 33F0F47595030DFBDB00DFE49D89AAEBBBCEB08704F504565E501E2281E774AA448B60
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(00CD28E9,?,00CC4CBE,00CD28E9,00D688B8,0000000C,00CC4E15,00CD28E9,00000002,00000000,?,00CD28E9), ref: 00CC4D09
                                                          • TerminateProcess.KERNEL32(00000000,?,00CC4CBE,00CD28E9,00D688B8,0000000C,00CC4E15,00CD28E9,00000002,00000000,?,00CD28E9), ref: 00CC4D10
                                                          • ExitProcess.KERNEL32 ref: 00CC4D22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: 6864ccffeaa6ed9c9adb2a9afa475a1a159908ea8b3686c85cc156b5c86a239b
                                                          • Instruction ID: 9b75b0f127e5c9ac33c5fd6944e8002fa164041f2ddb4902c8182de7b42955f2
                                                          • Opcode Fuzzy Hash: 6864ccffeaa6ed9c9adb2a9afa475a1a159908ea8b3686c85cc156b5c86a239b
                                                          • Instruction Fuzzy Hash: 60E0B631010248ABCF15BF64DD1AF983B69FB41791B148418FD16DA222CB35DE52DB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: /
                                                          • API String ID: 0-2043925204
                                                          • Opcode ID: 0f9d135613fe0191cc0a937e7dbd9dbe91a7e710870c6b3c99fb6b976c264892
                                                          • Instruction ID: 2aaead7019ef4960b50b6a10ab65543ee65474d85bef7fa6169aaafe7af06200
                                                          • Opcode Fuzzy Hash: 0f9d135613fe0191cc0a937e7dbd9dbe91a7e710870c6b3c99fb6b976c264892
                                                          • Instruction Fuzzy Hash: B3413B7650021A6FCB249FB9CC89EFB77B8EB84314F10426AFA15D7390E6709E41CB50
                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 00CFD28C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID: X64
                                                          • API String ID: 2645101109-893830106
                                                          • Opcode ID: ca163c03e6b1a6afdde39b37ae90dae53e73c2a038021973dae6ece9bae2f186
                                                          • Instruction ID: 496c020ceb8e3108a5f1b1c059c319de9e005474165f6d2e5426fbe457e09441
                                                          • Opcode Fuzzy Hash: ca163c03e6b1a6afdde39b37ae90dae53e73c2a038021973dae6ece9bae2f186
                                                          • Instruction Fuzzy Hash: DAD0C9B481111DEACB94DB90ECC8DDAB37CBB04305F100191F106E2100D73095488F20
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction ID: 6e9ed51d140cab7be87228cfdc90ebae4805c6d8836eb40b60eec0c4952f73a6
                                                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction Fuzzy Hash: 5E020C71E002199BDF14CFA9C980BADBBF1EF48314F25816DD929E7384D731AA418B94
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00D16918
                                                          • FindClose.KERNEL32(00000000), ref: 00D16961
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: d643b829e2e7e9b13743e1b96033250fc7e8e215eb0a69fc49f0d351fd5fbb29
                                                          • Instruction ID: 276346e4947f48efbd522e73e0d40bc9ce39a9d15decf398045d3ecb996f2cac
                                                          • Opcode Fuzzy Hash: d643b829e2e7e9b13743e1b96033250fc7e8e215eb0a69fc49f0d351fd5fbb29
                                                          • Instruction Fuzzy Hash: A51193356142119FC710DF69D884A16BBE5FF85328F14C699E4698F3A2CB30EC45CBA1
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00D24891,?,?,00000035,?), ref: 00D137E4
                                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00D24891,?,?,00000035,?), ref: 00D137F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: cd7f08cdad9763f8f5e805c021e1c41a3734702582a3730624a952169058e3cf
                                                          • Instruction ID: c4df6a956fae669f120da6f58b860222edc0734273d54b953b7fa4db19c9a239
                                                          • Opcode Fuzzy Hash: cd7f08cdad9763f8f5e805c021e1c41a3734702582a3730624a952169058e3cf
                                                          • Instruction Fuzzy Hash: 03F0A0B16043292AE62057A69C49FEB3AAEEF85765F000175B509E2291D9609944C7B0
                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00D0B25D
                                                          • keybd_event.USER32(?,753DC0D0,?,00000000), ref: 00D0B270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: InputSendkeybd_event
                                                          • String ID:
                                                          • API String ID: 3536248340-0
                                                          • Opcode ID: 86c53bd30b42a3cf5ee424ead5894331a23d3363d46dfab0a82505764c387ce0
                                                          • Instruction ID: 394f5f6460132a065d275edb8bb07b32314eb8c4a13928f7b0a1910c3be3f93a
                                                          • Opcode Fuzzy Hash: 86c53bd30b42a3cf5ee424ead5894331a23d3363d46dfab0a82505764c387ce0
                                                          • Instruction Fuzzy Hash: 0FF01D7181424DABDB059FA0C805BAE7BB4FF04315F04900AF955A5191C379C6119FA4
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00D011FC), ref: 00D010D4
                                                          • CloseHandle.KERNEL32(?,?,00D011FC), ref: 00D010E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: e0dda5a34b20fae7d631dab4b38600e8c227015d2b96d27176ea0cb8994d0b33
                                                          • Instruction ID: e59b962d92b005a8f49f0e088baab3aaa43cd2a39a2e92401337f0f85f869ea3
                                                          • Opcode Fuzzy Hash: e0dda5a34b20fae7d631dab4b38600e8c227015d2b96d27176ea0cb8994d0b33
                                                          • Instruction Fuzzy Hash: AAE0BF72014750AEE7252B61FC05EB777E9EB04310F14882DF5A5905B1DB62ACA1EB60
                                                          Strings
                                                          • Variable is not of type 'Object'., xrefs: 00CF0C40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable is not of type 'Object'.
                                                          • API String ID: 0-1840281001
                                                          • Opcode ID: 1eb0e8e2e2ea0f02afcf6421b06db19873734b65189d4dad7898e021d48bee8a
                                                          • Instruction ID: de4802c200d36af0d5412ad7c9a16716ade9683f0486638fb5ca334604894ae7
                                                          • Opcode Fuzzy Hash: 1eb0e8e2e2ea0f02afcf6421b06db19873734b65189d4dad7898e021d48bee8a
                                                          • Instruction Fuzzy Hash: 17329A7090021ADFCF14DF94C885AFDB7B5FF06308F248069E916AB292DB35AE45DB61
                                                          APIs
                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00CD6766,?,?,00000008,?,?,00CDFEFE,00000000), ref: 00CD6998
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID:
                                                          • API String ID: 3997070919-0
                                                          • Opcode ID: ca4f50ad80b6a84cba71cebdaef265e5ab2dbe69703a646387e01dbf0cf5573b
                                                          • Instruction ID: 0b3ea1d68bb04f58d21aac9ff32d6f46105a68920ed3df894bd4d9ad1e6848c9
                                                          • Opcode Fuzzy Hash: ca4f50ad80b6a84cba71cebdaef265e5ab2dbe69703a646387e01dbf0cf5573b
                                                          • Instruction Fuzzy Hash: 13B14A316106099FD715CF28C48AB657BE0FF45364F25865AEAE9CF3A2C335EA81DB40
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3916222277
                                                          • Opcode ID: dd60f4085bc05c737cdf5be1c4af4b83f6ddb121cc1afaa05ad48bfb8ef37d07
                                                          • Instruction ID: 768f22c4a820c72a9359019050a68883a55db904ad49ee95ff0555574d3ae567
                                                          • Opcode Fuzzy Hash: dd60f4085bc05c737cdf5be1c4af4b83f6ddb121cc1afaa05ad48bfb8ef37d07
                                                          • Instruction Fuzzy Hash: C5127E71A002299BDB64CF59C8806FEB7F5FF48310F10819AE949EB251DB709E85CFA1
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 00D1EABD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 73966990cdf8a5966e866875e690e0143eef858b9480c81730a9e14c133d4ccc
                                                          • Instruction ID: c9f65d785cf0b46fa760db41b327ddbea64b17469127c0cef04dbf645b494e65
                                                          • Opcode Fuzzy Hash: 73966990cdf8a5966e866875e690e0143eef858b9480c81730a9e14c133d4ccc
                                                          • Instruction Fuzzy Hash: 70E04F32214205AFC710EF69E845E9AF7E9AF99764F048416FC4AD7361DB70EC808BA1
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00CC03EE), ref: 00CC09DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 18b4898833545ab2757a6b4b345049fe7e4e2c30d28c411ae063f180724f9699
                                                          • Instruction ID: 1b20b1c7169589d335e568f73c26a39a180334010f0106ab48c23874d97b96a8
                                                          • Opcode Fuzzy Hash: 18b4898833545ab2757a6b4b345049fe7e4e2c30d28c411ae063f180724f9699
                                                          • Instruction Fuzzy Hash:
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction ID: a57b903c28d125d9c4087abb48c6d0014ba974e88435184ab29152bacb84f7f1
                                                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction Fuzzy Hash: 5051756160C6055BDF388629C95AFBF2399DB12340F18070DEAA2EB6C2C625DF45EF52
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9826ab65b07dd3bb65fc7d20d62bff264078b217e8482768c522ac57c030f916
                                                          • Instruction ID: e86eb8c79b34a1ad8f2d0cf5ea0842e2ab52c91015115354eb10a13cb40023df
                                                          • Opcode Fuzzy Hash: 9826ab65b07dd3bb65fc7d20d62bff264078b217e8482768c522ac57c030f916
                                                          • Instruction Fuzzy Hash: 0C321326D29F014EDB239A34D862335A249AFB73C5F55C737F82AB5AA5FB39C5834100
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 973e589a0e05a889cde96530e2ab012e559f46c1ad1709d5944665a16a99867f
                                                          • Instruction ID: a55f9771de67f94c4409d2f8025943f45b63dd3baffb2f0a6b5ee7a51443124f
                                                          • Opcode Fuzzy Hash: 973e589a0e05a889cde96530e2ab012e559f46c1ad1709d5944665a16a99867f
                                                          • Instruction Fuzzy Hash: D6321631B0411D8BDF68CF2DC6D46BD7BA1EB45300F28856AD66ACB295D230DE81EB52
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fecbb4e7e8bcac88271936957c26dc89729ae868e6ae66c65faed6c5b513129b
                                                          • Instruction ID: 341083f5d1495b33822acb87cf8e91a703195a7caa3c3df661c3752870b03fde
                                                          • Opcode Fuzzy Hash: fecbb4e7e8bcac88271936957c26dc89729ae868e6ae66c65faed6c5b513129b
                                                          • Instruction Fuzzy Hash: 9E22B1B0A0064ADFDF14CF65D981AEEB3F5FF45308F204629E816A7291EB359E11DB60
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8c8b9b8ce2a1d8747447e4471ebca304814228cf6f4ca23e62858cc3b9b2cea2
                                                          • Instruction ID: 95b22b3cba219d0105bfaa0ef54bad0790305f4b5dfc8c01a0c95db44e663e4d
                                                          • Opcode Fuzzy Hash: 8c8b9b8ce2a1d8747447e4471ebca304814228cf6f4ca23e62858cc3b9b2cea2
                                                          • Instruction Fuzzy Hash: DD02B6B0E00246EBDB04DF65D881AAEB7B5FF44344F208169E816DB391EB31EE11DB95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction ID: aad0dfc7937d5e211b0a38e10825c2f40727e655b1819483396eac13136814b0
                                                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction Fuzzy Hash: 959157725080A34AD72A463BC574A7DFFE15A533A131D079DECF3CA1C6EE24CA65D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction ID: 4946d0021240dce2e319e0f867d1c4e0ce7d64192ee87fdab6b525e51916d51b
                                                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction Fuzzy Hash: 329125722090A34EDB2D467BC57493DFFE15A933A131D079DD8F2CA1C2FD24CA65AA20
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8b46efd753f4801304fdfdc76f62ec9e9fc8e47ed918d2463160761e52360511
                                                          • Instruction ID: b64e7d45d99f10e22fbd83722f91230f146046bdc1a12ae3ac4758c13561cb40
                                                          • Opcode Fuzzy Hash: 8b46efd753f4801304fdfdc76f62ec9e9fc8e47ed918d2463160761e52360511
                                                          • Instruction Fuzzy Hash: 12616671608709A7DF349A28C9B6FBF2394DF41710F101B5EE863CB281DA119F82AF55
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1c27747832112b3605ba2cb41664d96f2e837838c49e97df6f1d34573f1ed724
                                                          • Instruction ID: ecb8fd468c33d8d1c95b1a3261217f1ba4790c17a61213c848d0cde452a9ca79
                                                          • Opcode Fuzzy Hash: 1c27747832112b3605ba2cb41664d96f2e837838c49e97df6f1d34573f1ed724
                                                          • Instruction Fuzzy Hash: 24617A726087096BDE385A28C856FBF2394EF42740F100B5EF853DB681DA12EF46DE55
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction ID: 8e9516affb2bfb7095b9baad6bb6951176559e8a5f16476765b5e847aabfa27f
                                                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction Fuzzy Hash: ED81447250D0A349DB69463BC574A3EFFE15A933A131E079DD8F2CA1C3EE24D654E620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 95822b9821b64f073c44fef441cb6fd47243b854d6573f9c6f224b9881a6d986
                                                          • Instruction ID: 1247e2233fb19b2fc8e79c203144fb85e651bbf5253c92195db5c2588ae7caa6
                                                          • Opcode Fuzzy Hash: 95822b9821b64f073c44fef441cb6fd47243b854d6573f9c6f224b9881a6d986
                                                          • Instruction Fuzzy Hash: 9421BB326206118BD728CF79C8236BE73E5E754310F19862EE4A7C37D1DE36A944C750
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00D22B30
                                                          • DeleteObject.GDI32(00000000), ref: 00D22B43
                                                          • DestroyWindow.USER32 ref: 00D22B52
                                                          • GetDesktopWindow.USER32 ref: 00D22B6D
                                                          • GetWindowRect.USER32(00000000), ref: 00D22B74
                                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00D22CA3
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00D22CB1
                                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D22CF8
                                                          • GetClientRect.USER32(00000000,?), ref: 00D22D04
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00D22D40
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D22D62
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D22D75
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D22D80
                                                          • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D22D89
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D22D98
                                                          • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D22DA1
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D22DA8
                                                          • GlobalFree.KERNEL32(00000000), ref: 00D22DB3
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D22DC5
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00D3FC38,00000000), ref: 00D22DDB
                                                          • GlobalFree.KERNEL32(00000000), ref: 00D22DEB
                                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00D22E11
                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00D22E30
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D22E52
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D2303F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $@U=u$AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-3613752883
                                                          • Opcode ID: 6f75d68ac0f185cd80effb48d617950716e17f3d45ddd9bd996df153ff255748
                                                          • Instruction ID: 5b0720fcab9a134ea26be58d3ab0aa6605844f0bc85c14ded9d313a4cb41a1be
                                                          • Opcode Fuzzy Hash: 6f75d68ac0f185cd80effb48d617950716e17f3d45ddd9bd996df153ff255748
                                                          • Instruction Fuzzy Hash: AC027975910215AFDB14DFA8DC89EAE7BB9EF49314F048118F915EB2A1DB74AD00CB70
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 00D3712F
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00D37160
                                                          • GetSysColor.USER32(0000000F), ref: 00D3716C
                                                          • SetBkColor.GDI32(?,000000FF), ref: 00D37186
                                                          • SelectObject.GDI32(?,?), ref: 00D37195
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00D371C0
                                                          • GetSysColor.USER32(00000010), ref: 00D371C8
                                                          • CreateSolidBrush.GDI32(00000000), ref: 00D371CF
                                                          • FrameRect.USER32(?,?,00000000), ref: 00D371DE
                                                          • DeleteObject.GDI32(00000000), ref: 00D371E5
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00D37230
                                                          • FillRect.USER32(?,?,?), ref: 00D37262
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D37284
                                                            • Part of subcall function 00D373E8: GetSysColor.USER32(00000012), ref: 00D37421
                                                            • Part of subcall function 00D373E8: SetTextColor.GDI32(?,?), ref: 00D37425
                                                            • Part of subcall function 00D373E8: GetSysColorBrush.USER32(0000000F), ref: 00D3743B
                                                            • Part of subcall function 00D373E8: GetSysColor.USER32(0000000F), ref: 00D37446
                                                            • Part of subcall function 00D373E8: GetSysColor.USER32(00000011), ref: 00D37463
                                                            • Part of subcall function 00D373E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00D37471
                                                            • Part of subcall function 00D373E8: SelectObject.GDI32(?,00000000), ref: 00D37482
                                                            • Part of subcall function 00D373E8: SetBkColor.GDI32(?,00000000), ref: 00D3748B
                                                            • Part of subcall function 00D373E8: SelectObject.GDI32(?,?), ref: 00D37498
                                                            • Part of subcall function 00D373E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00D374B7
                                                            • Part of subcall function 00D373E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00D374CE
                                                            • Part of subcall function 00D373E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00D374DB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID: @U=u
                                                          • API String ID: 4124339563-2594219639
                                                          • Opcode ID: 6806f4198fc14b7cb8efdcbe8dd8e88d9b17ee85cf357c31f3b3142362af3a2f
                                                          • Instruction ID: b43ad55517581a9135d84439b1c83af3897262c9d46472833bda5ba35dfb7736
                                                          • Opcode Fuzzy Hash: 6806f4198fc14b7cb8efdcbe8dd8e88d9b17ee85cf357c31f3b3142362af3a2f
                                                          • Instruction Fuzzy Hash: 1DA1C072018701BFDB109F60DC48E6B7BA9FF48320F142A19F9A2E62E1D771E944DB61
                                                          APIs
                                                          • DestroyWindow.USER32(?,?), ref: 00CB8E14
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00CF6AC5
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00CF6AFE
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00CF6F43
                                                            • Part of subcall function 00CB8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00CB8BE8,?,00000000,?,?,?,?,00CB8BBA,00000000,?), ref: 00CB8FC5
                                                          • SendMessageW.USER32(?,00001053), ref: 00CF6F7F
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00CF6F96
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00CF6FAC
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00CF6FB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                          • String ID: 0$@U=u
                                                          • API String ID: 2760611726-975001249
                                                          • Opcode ID: 32ed074ca80cf54b9c22978885b0f1eba203e1bb7408694d04fcfc0ec7d2749a
                                                          • Instruction ID: fcecb91ec951debcb705f3bfc6ca5d609148c2df074ceb5f43e105c092e5798c
                                                          • Opcode Fuzzy Hash: 32ed074ca80cf54b9c22978885b0f1eba203e1bb7408694d04fcfc0ec7d2749a
                                                          • Instruction Fuzzy Hash: 3E12BC38200245EFDB65DF28C844BB6B7E5FB44300F144169E6A9DB261CB31ED96DFA2
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 00D2273E
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00D2286A
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00D228A9
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00D228B9
                                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00D22900
                                                          • GetClientRect.USER32(00000000,?), ref: 00D2290C
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00D22955
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00D22964
                                                          • GetStockObject.GDI32(00000011), ref: 00D22974
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00D22978
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00D22988
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D22991
                                                          • DeleteDC.GDI32(00000000), ref: 00D2299A
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00D229C6
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00D229DD
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00D22A1D
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00D22A31
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00D22A42
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00D22A77
                                                          • GetStockObject.GDI32(00000011), ref: 00D22A82
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00D22A8D
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00D22A97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: @U=u$AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-2771358697
                                                          • Opcode ID: 06d3f3b614c9d747a98a37a360bb18dc8ac7c2aabc9b976427a188d8b4c59fbe
                                                          • Instruction ID: a6d8bfa3cc735bc00bd96396356dc6229186870ef869170886ccdc50fc73fa03
                                                          • Opcode Fuzzy Hash: 06d3f3b614c9d747a98a37a360bb18dc8ac7c2aabc9b976427a188d8b4c59fbe
                                                          • Instruction Fuzzy Hash: 34B15C75A10215BFEB14DF68DC8AFAE7BA9EB08714F008214F915E72A1D774ED40CBA0
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 00D37421
                                                          • SetTextColor.GDI32(?,?), ref: 00D37425
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00D3743B
                                                          • GetSysColor.USER32(0000000F), ref: 00D37446
                                                          • CreateSolidBrush.GDI32(?), ref: 00D3744B
                                                          • GetSysColor.USER32(00000011), ref: 00D37463
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00D37471
                                                          • SelectObject.GDI32(?,00000000), ref: 00D37482
                                                          • SetBkColor.GDI32(?,00000000), ref: 00D3748B
                                                          • SelectObject.GDI32(?,?), ref: 00D37498
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00D374B7
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00D374CE
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00D374DB
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00D3752A
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00D37554
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00D37572
                                                          • DrawFocusRect.USER32(?,?), ref: 00D3757D
                                                          • GetSysColor.USER32(00000011), ref: 00D3758E
                                                          • SetTextColor.GDI32(?,00000000), ref: 00D37596
                                                          • DrawTextW.USER32(?,00D370F5,000000FF,?,00000000), ref: 00D375A8
                                                          • SelectObject.GDI32(?,?), ref: 00D375BF
                                                          • DeleteObject.GDI32(?), ref: 00D375CA
                                                          • SelectObject.GDI32(?,?), ref: 00D375D0
                                                          • DeleteObject.GDI32(?), ref: 00D375D5
                                                          • SetTextColor.GDI32(?,?), ref: 00D375DB
                                                          • SetBkColor.GDI32(?,?), ref: 00D375E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID: @U=u
                                                          • API String ID: 1996641542-2594219639
                                                          • Opcode ID: 8d867d8d51d71929bbdc79583c0984285272035415ecae7847b01dcd2645e62e
                                                          • Instruction ID: 1a2f6aa369c1b2c21c825a67a8e66cf15d43ae9a91650506bfc8e01678ff24ea
                                                          • Opcode Fuzzy Hash: 8d867d8d51d71929bbdc79583c0984285272035415ecae7847b01dcd2645e62e
                                                          • Instruction Fuzzy Hash: 5A617B72900218AFDF119FA4DC49EEEBFB9EB08360F145115F911FB2A1D775A940DBA0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00D14AED
                                                          • GetDriveTypeW.KERNEL32(?,00D3CB68,?,\\.\,00D3CC08), ref: 00D14BCA
                                                          • SetErrorMode.KERNEL32(00000000,00D3CB68,?,\\.\,00D3CC08), ref: 00D14D36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 13febc4f5700c35236349e421326cc14ba4e320c719f8355e72ba02956176401
                                                          • Instruction ID: cf3046f2f6decd46c98e552bb49647cd38b523841248264ad7c6775c038771d1
                                                          • Opcode Fuzzy Hash: 13febc4f5700c35236349e421326cc14ba4e320c719f8355e72ba02956176401
                                                          • Instruction Fuzzy Hash: B461A370605206FFCB04DF24EA82DE9B7A2EF45744B284015F846AB291DF35DD85EBB1
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00D302E5
                                                          • _wcslen.LIBCMT ref: 00D3031F
                                                          • _wcslen.LIBCMT ref: 00D30389
                                                          • _wcslen.LIBCMT ref: 00D303F1
                                                          • _wcslen.LIBCMT ref: 00D30475
                                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00D304C5
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D30504
                                                            • Part of subcall function 00CBF9F2: _wcslen.LIBCMT ref: 00CBF9FD
                                                            • Part of subcall function 00D0223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D02258
                                                            • Part of subcall function 00D0223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D0228A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: @U=u$DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                          • API String ID: 1103490817-1753161424
                                                          • Opcode ID: 7f4ff3d3407302a63b673d97bb06f2daba9ed57d85ee35ca0534c596a082cacc
                                                          • Instruction ID: c9abcf384ec1ce192a40bc30b822e6076acddc8873ea3639a14d536543170b86
                                                          • Opcode Fuzzy Hash: 7f4ff3d3407302a63b673d97bb06f2daba9ed57d85ee35ca0534c596a082cacc
                                                          • Instruction Fuzzy Hash: 80E1B0316183018FC714DF24C86196EBBE6BF88718F18495CF8969B3A6DB30ED45DBA1
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00D31128
                                                          • GetDesktopWindow.USER32 ref: 00D3113D
                                                          • GetWindowRect.USER32(00000000), ref: 00D31144
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D31199
                                                          • DestroyWindow.USER32(?), ref: 00D311B9
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00D311ED
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D3120B
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00D3121D
                                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 00D31232
                                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00D31245
                                                          • IsWindowVisible.USER32(00000000), ref: 00D312A1
                                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00D312BC
                                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00D312D0
                                                          • GetWindowRect.USER32(00000000,?), ref: 00D312E8
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00D3130E
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00D31328
                                                          • CopyRect.USER32(?,?), ref: 00D3133F
                                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 00D313AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: e65503f23a3f0e75c0f7bd65c2c5c3eb16eec1b63eab33c05dcb043838d4cb51
                                                          • Instruction ID: 7b2831abb9199ae1f16f374446854edc382511ec9b20591822382afa301eda6a
                                                          • Opcode Fuzzy Hash: e65503f23a3f0e75c0f7bd65c2c5c3eb16eec1b63eab33c05dcb043838d4cb51
                                                          • Instruction Fuzzy Hash: 7DB19C75608342AFD714DF64C885BABBBE4FF85354F048918F999AB2A1C731EC44CBA1
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00CB8968
                                                          • GetSystemMetrics.USER32(00000007), ref: 00CB8970
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00CB899B
                                                          • GetSystemMetrics.USER32(00000008), ref: 00CB89A3
                                                          • GetSystemMetrics.USER32(00000004), ref: 00CB89C8
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00CB89E5
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00CB89F5
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00CB8A28
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00CB8A3C
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 00CB8A5A
                                                          • GetStockObject.GDI32(00000011), ref: 00CB8A76
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00CB8A81
                                                            • Part of subcall function 00CB912D: GetCursorPos.USER32(?), ref: 00CB9141
                                                            • Part of subcall function 00CB912D: ScreenToClient.USER32(00000000,?), ref: 00CB915E
                                                            • Part of subcall function 00CB912D: GetAsyncKeyState.USER32(00000001), ref: 00CB9183
                                                            • Part of subcall function 00CB912D: GetAsyncKeyState.USER32(00000002), ref: 00CB919D
                                                          • SetTimer.USER32(00000000,00000000,00000028,00CB90FC), ref: 00CB8AA8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: @U=u$AutoIt v3 GUI
                                                          • API String ID: 1458621304-2077007950
                                                          • Opcode ID: 68a5d971526a4ec78fd1c9379befb38ed9d2ebd65cb9a9d4d0d2db171e5b2985
                                                          • Instruction ID: 27b535cba7f5a7ff6215421739c468d41b5fb08838324bf84fd92f6d65792b69
                                                          • Opcode Fuzzy Hash: 68a5d971526a4ec78fd1c9379befb38ed9d2ebd65cb9a9d4d0d2db171e5b2985
                                                          • Instruction Fuzzy Hash: 66B12975A0020AAFDF14DFA8DC45BEA7BB5FB48314F104229FA25E7290DB74A941CF61
                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 00D05A2E
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00D05A40
                                                          • SetWindowTextW.USER32(?,?), ref: 00D05A57
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00D05A6C
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00D05A72
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00D05A82
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00D05A88
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00D05AA9
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00D05AC3
                                                          • GetWindowRect.USER32(?,?), ref: 00D05ACC
                                                          • _wcslen.LIBCMT ref: 00D05B33
                                                          • SetWindowTextW.USER32(?,?), ref: 00D05B6F
                                                          • GetDesktopWindow.USER32 ref: 00D05B75
                                                          • GetWindowRect.USER32(00000000), ref: 00D05B7C
                                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00D05BD3
                                                          • GetClientRect.USER32(?,?), ref: 00D05BE0
                                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 00D05C05
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00D05C2F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                          • String ID: @U=u
                                                          • API String ID: 895679908-2594219639
                                                          • Opcode ID: b136a0cdaa96a3dcac88cf3c7bcc21137aec8408f3070b7d4c790d59efc411e1
                                                          • Instruction ID: d8314658f5cbf406bbb00f9829ecb2eb0fc2e9d5dc727d58b9e27e5e2abc8aa6
                                                          • Opcode Fuzzy Hash: b136a0cdaa96a3dcac88cf3c7bcc21137aec8408f3070b7d4c790d59efc411e1
                                                          • Instruction Fuzzy Hash: 37714A31900B09AFDB20DFA8DD45BAEBBF5EB48704F144518E986A26A4D775E940CF60
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00D309C6
                                                          • _wcslen.LIBCMT ref: 00D30A01
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00D30A54
                                                          • _wcslen.LIBCMT ref: 00D30A8A
                                                          • _wcslen.LIBCMT ref: 00D30B06
                                                          • _wcslen.LIBCMT ref: 00D30B81
                                                            • Part of subcall function 00CBF9F2: _wcslen.LIBCMT ref: 00CBF9FD
                                                            • Part of subcall function 00D02BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D02BFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: @U=u$CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 1103490817-383632319
                                                          • Opcode ID: cde3b448369abc69f217fe6d8a58613ea98141d95cfb6c875121535e92a5629d
                                                          • Instruction ID: 5c926b29db3478624e394e9806271849f93374abb0e078aef82f81053c7181f3
                                                          • Opcode Fuzzy Hash: cde3b448369abc69f217fe6d8a58613ea98141d95cfb6c875121535e92a5629d
                                                          • Instruction Fuzzy Hash: 66E1B1316083018FC714DF24C46096ABBE1FF99718F18895CF8969B7A2D731ED45DBA1
                                                          APIs
                                                            • Part of subcall function 00D010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D01114
                                                            • Part of subcall function 00D010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00D00B9B,?,?,?), ref: 00D01120
                                                            • Part of subcall function 00D010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00D00B9B,?,?,?), ref: 00D0112F
                                                            • Part of subcall function 00D010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00D00B9B,?,?,?), ref: 00D01136
                                                            • Part of subcall function 00D010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D0114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00D00DF5
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00D00E29
                                                          • GetLengthSid.ADVAPI32(?), ref: 00D00E40
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00D00E7A
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00D00E96
                                                          • GetLengthSid.ADVAPI32(?), ref: 00D00EAD
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00D00EB5
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00D00EBC
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00D00EDD
                                                          • CopySid.ADVAPI32(00000000), ref: 00D00EE4
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00D00F13
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00D00F35
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00D00F47
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D00F6E
                                                          • HeapFree.KERNEL32(00000000), ref: 00D00F75
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D00F7E
                                                          • HeapFree.KERNEL32(00000000), ref: 00D00F85
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D00F8E
                                                          • HeapFree.KERNEL32(00000000), ref: 00D00F95
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00D00FA1
                                                          • HeapFree.KERNEL32(00000000), ref: 00D00FA8
                                                            • Part of subcall function 00D01193: GetProcessHeap.KERNEL32(00000008,00D00BB1,?,00000000,?,00D00BB1,?), ref: 00D011A1
                                                            • Part of subcall function 00D01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00D00BB1,?), ref: 00D011A8
                                                            • Part of subcall function 00D01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00D00BB1,?), ref: 00D011B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: c95182ab71e73b8fcc01b93eaba4487b7116bdb9c8cfea53c1609efb7f6a4a6b
                                                          • Instruction ID: 48366546d2ab9ff08bca0049da70f62e2d6690705594b2aceae1b969c942815a
                                                          • Opcode Fuzzy Hash: c95182ab71e73b8fcc01b93eaba4487b7116bdb9c8cfea53c1609efb7f6a4a6b
                                                          • Instruction Fuzzy Hash: 34714A7290430ABBDB209FA4DC49BAEBFB8BF05301F184115FA59F6291D7719905DB70
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00D3835A
                                                          • _wcslen.LIBCMT ref: 00D3836E
                                                          • _wcslen.LIBCMT ref: 00D38391
                                                          • _wcslen.LIBCMT ref: 00D383B4
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00D383F2
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00D3361A,?), ref: 00D3844E
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00D38487
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00D384CA
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00D38501
                                                          • FreeLibrary.KERNEL32(?), ref: 00D3850D
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00D3851D
                                                          • DestroyIcon.USER32(?), ref: 00D3852C
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00D38549
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00D38555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                          • String ID: .dll$.exe$.icl$@U=u
                                                          • API String ID: 799131459-1639919054
                                                          • Opcode ID: 2327a2e529bac81f85e6291f0435a3c5f3bbecf463a8ae7369f751591b53df34
                                                          • Instruction ID: 80373adbc33ff2bf96da3b01d3a4d3c63fa2399457da6bedba7817a695b7681a
                                                          • Opcode Fuzzy Hash: 2327a2e529bac81f85e6291f0435a3c5f3bbecf463a8ae7369f751591b53df34
                                                          • Instruction Fuzzy Hash: 5761B072550319BEEB14DF64CC41BBE77A8BB08711F108609F815E61D1DB74A984E7B0
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D2C4BD
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00D3CC08,00000000,?,00000000,?,?), ref: 00D2C544
                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00D2C5A4
                                                          • _wcslen.LIBCMT ref: 00D2C5F4
                                                          • _wcslen.LIBCMT ref: 00D2C66F
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00D2C6B2
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00D2C7C1
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00D2C84D
                                                          • RegCloseKey.ADVAPI32(?), ref: 00D2C881
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D2C88E
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00D2C960
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 9721498-966354055
                                                          • Opcode ID: 1873073e4e14f0ac9498e091728a20d999577d2b85ba8eaf8764b8c8388cc809
                                                          • Instruction ID: f60e4a80d2d100d9503ec0279d1533cce5f8ec37165ee353fb95c8e548f7c0ed
                                                          • Opcode Fuzzy Hash: 1873073e4e14f0ac9498e091728a20d999577d2b85ba8eaf8764b8c8388cc809
                                                          • Instruction Fuzzy Hash: 4A1279356142119FCB14EF14D891A2AB7E5FF89718F08895CF88A9B3A2DB31FC41DB91
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 1256254125-909552448
                                                          • Opcode ID: 5170d8fc2b86666d183d8b5d9a6d72f2c0609f88828009b4034a28c32ab21428
                                                          • Instruction ID: d991bdd8703270463ce5ecb17be1386107f9208c5a86195212718380490514b0
                                                          • Opcode Fuzzy Hash: 5170d8fc2b86666d183d8b5d9a6d72f2c0609f88828009b4034a28c32ab21428
                                                          • Instruction Fuzzy Hash: F171F532A2013A8BCB20DE7CED516BE3395AFB175CF295528F86697284E631CD45D3B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 0-1645009161
                                                          • Opcode ID: d8692b09ba4b643b217a291111f3183e67931c6912d21c6ad23a47e85185da40
                                                          • Instruction ID: cfa30fdd2e80b246e89fd29813be2aa041b6656faa1ec8be89cdf2e79000f38a
                                                          • Opcode Fuzzy Hash: d8692b09ba4b643b217a291111f3183e67931c6912d21c6ad23a47e85185da40
                                                          • Instruction Fuzzy Hash: DD81E771A44606BFDB21AF61DC42FAF37A8BF16304F044128F915EA192EB70DA15E7A1
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00D38592
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00D385A2
                                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00D385AD
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D385BA
                                                          • GlobalLock.KERNEL32(00000000), ref: 00D385C8
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00D385D7
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00D385E0
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D385E7
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00D385F8
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00D3FC38,?), ref: 00D38611
                                                          • GlobalFree.KERNEL32(00000000), ref: 00D38621
                                                          • GetObjectW.GDI32(?,00000018,000000FF), ref: 00D38641
                                                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00D38671
                                                          • DeleteObject.GDI32(00000000), ref: 00D38699
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00D386AF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID: @U=u
                                                          • API String ID: 3840717409-2594219639
                                                          • Opcode ID: e22736b21b7cae7145e53d9fc6b045884679b13684a7196a95b179e2355ffed9
                                                          • Instruction ID: a40dd1d74b4fc8dcde1023d1679a79d38bcd8b580ce9f08c8cef4d0c0425b42a
                                                          • Opcode Fuzzy Hash: e22736b21b7cae7145e53d9fc6b045884679b13684a7196a95b179e2355ffed9
                                                          • Instruction Fuzzy Hash: 2E41F875610308AFDB119FA5DC89EAB7BB8FF89B11F148058F906E7260DB709901DB70
                                                          APIs
                                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00CC00C6
                                                            • Part of subcall function 00CC00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00D7070C,00000FA0,5B91761E,?,?,?,?,00CE23B3,000000FF), ref: 00CC011C
                                                            • Part of subcall function 00CC00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00CE23B3,000000FF), ref: 00CC0127
                                                            • Part of subcall function 00CC00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00CE23B3,000000FF), ref: 00CC0138
                                                            • Part of subcall function 00CC00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00CC014E
                                                            • Part of subcall function 00CC00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00CC015C
                                                            • Part of subcall function 00CC00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00CC016A
                                                            • Part of subcall function 00CC00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00CC0195
                                                            • Part of subcall function 00CC00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00CC01A0
                                                          • ___scrt_fastfail.LIBCMT ref: 00CC00E7
                                                            • Part of subcall function 00CC00A3: __onexit.LIBCMT ref: 00CC00A9
                                                          Strings
                                                          • InitializeConditionVariable, xrefs: 00CC0148
                                                          • SleepConditionVariableCS, xrefs: 00CC0154
                                                          • WakeAllConditionVariable, xrefs: 00CC0162
                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00CC0122
                                                          • kernel32.dll, xrefs: 00CC0133
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                          • API String ID: 66158676-1714406822
                                                          • Opcode ID: dd8176a3b03b03b9520452313d437de1398a12d5dfdbe32d9b5199271203e925
                                                          • Instruction ID: fde1d35d1f610a9ce317e4e1f896199d0f9f58162f3df752ce00edff3bfa26f9
                                                          • Opcode Fuzzy Hash: dd8176a3b03b03b9520452313d437de1398a12d5dfdbe32d9b5199271203e925
                                                          • Instruction Fuzzy Hash: FD21F632A44710EFE7115BA4EC0AF6EB7A8DB04B61F24013DF815E23D1DBB09C009AB0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 176396367-1603158881
                                                          • Opcode ID: 71b8f02a73055f1e75a3b95b96e5f666fc9b52a09bf72f89daa63dd3028aaf5d
                                                          • Instruction ID: d409a885a5b9411ad61e7e5b6b437338b94dd0e25a2ad8f3a943beba4f715d6a
                                                          • Opcode Fuzzy Hash: 71b8f02a73055f1e75a3b95b96e5f666fc9b52a09bf72f89daa63dd3028aaf5d
                                                          • Instruction Fuzzy Hash: D5E1B631A00616AFCB18DF78C855BEDBBB8BF54710F588119E45AB7290DB30AE85D7B0
                                                          APIs
                                                          • CharLowerBuffW.USER32(00000000,00000000,00D3CC08), ref: 00D14527
                                                          • _wcslen.LIBCMT ref: 00D1453B
                                                          • _wcslen.LIBCMT ref: 00D14599
                                                          • _wcslen.LIBCMT ref: 00D145F4
                                                          • _wcslen.LIBCMT ref: 00D1463F
                                                          • _wcslen.LIBCMT ref: 00D146A7
                                                            • Part of subcall function 00CBF9F2: _wcslen.LIBCMT ref: 00CBF9FD
                                                          • GetDriveTypeW.KERNEL32(?,00D66BF0,00000061), ref: 00D14743
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharDriveLowerType
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2055661098-1000479233
                                                          • Opcode ID: 808e446bd63471fc060c039590369d265aee0eca5db39ede067b411523307e99
                                                          • Instruction ID: 221aaffe8fd132560dcf6fc61617fd8ed99be1367127ec12c7009272d09dab0a
                                                          • Opcode Fuzzy Hash: 808e446bd63471fc060c039590369d265aee0eca5db39ede067b411523307e99
                                                          • Instruction Fuzzy Hash: 96B1E571608302AFC710DF28E890AAEB7E5BF96764F54891DF496C7291DB30D885C7B2
                                                          APIs
                                                          • DestroyWindow.USER32(?,?), ref: 00D36DEB
                                                            • Part of subcall function 00CA6B57: _wcslen.LIBCMT ref: 00CA6B6A
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00D36E5F
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00D36E81
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D36E94
                                                          • DestroyWindow.USER32(?), ref: 00D36EB5
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00CA0000,00000000), ref: 00D36EE4
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D36EFD
                                                          • GetDesktopWindow.USER32 ref: 00D36F16
                                                          • GetWindowRect.USER32(00000000), ref: 00D36F1D
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00D36F35
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00D36F4D
                                                            • Part of subcall function 00CB9944: GetWindowLongW.USER32(?,000000EB), ref: 00CB9952
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                          • String ID: 0$@U=u$tooltips_class32
                                                          • API String ID: 2429346358-1130792468
                                                          • Opcode ID: d7e3c8fea6d08ccf949d11254cbf30784a779aaeec1b4f93ba81b416fdb80cf0
                                                          • Instruction ID: e71a162091a229cd13980a223d2928935d4862fbe79a8c609cd2315231552225
                                                          • Opcode Fuzzy Hash: d7e3c8fea6d08ccf949d11254cbf30784a779aaeec1b4f93ba81b416fdb80cf0
                                                          • Instruction Fuzzy Hash: 6D716574104345AFDB21CF18D844BAABBE9FF89304F08891DFA99D7261D770E94ADB21
                                                          APIs
                                                            • Part of subcall function 00CB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CB9BB2
                                                          • DragQueryPoint.SHELL32(?,?), ref: 00D39147
                                                            • Part of subcall function 00D37674: ClientToScreen.USER32(?,?), ref: 00D3769A
                                                            • Part of subcall function 00D37674: GetWindowRect.USER32(?,?), ref: 00D37710
                                                            • Part of subcall function 00D37674: PtInRect.USER32(?,?,00D38B89), ref: 00D37720
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00D391B0
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00D391BB
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00D391DE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00D39225
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00D3923E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00D39255
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00D39277
                                                          • DragFinish.SHELL32(?), ref: 00D3927E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00D39371
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$@U=u
                                                          • API String ID: 221274066-762882726
                                                          • Opcode ID: 93bde1902445d0c6da4dc58f8d8bd4f542444229136a5ec933c1fb2f366565fd
                                                          • Instruction ID: 1671d3ddfaeb6571626d8f4720e3d99339745db1ef9c7ea9f290c2e820b46cee
                                                          • Opcode Fuzzy Hash: 93bde1902445d0c6da4dc58f8d8bd4f542444229136a5ec933c1fb2f366565fd
                                                          • Instruction Fuzzy Hash: 7B617C71108301AFC701EF64DC85DAFBBE8EF89754F400A1EF595932A1DB70AA49CB62
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00D2B198
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00D2B1B0
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00D2B1D4
                                                          • _wcslen.LIBCMT ref: 00D2B200
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00D2B214
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00D2B236
                                                          • _wcslen.LIBCMT ref: 00D2B332
                                                            • Part of subcall function 00D105A7: GetStdHandle.KERNEL32(000000F6), ref: 00D105C6
                                                          • _wcslen.LIBCMT ref: 00D2B34B
                                                          • _wcslen.LIBCMT ref: 00D2B366
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00D2B3B6
                                                          • GetLastError.KERNEL32(00000000), ref: 00D2B407
                                                          • CloseHandle.KERNEL32(?), ref: 00D2B439
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D2B44A
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D2B45C
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D2B46E
                                                          • CloseHandle.KERNEL32(?), ref: 00D2B4E3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 2178637699-0
                                                          • Opcode ID: b764e0701a423af9379af297aeb6766ca0474a948c07d856b1b46da87d0e8bcf
                                                          • Instruction ID: 46dc00a78bccf2dfd4424939369b9c840b04c59a9468470192deb6de4e13d63e
                                                          • Opcode Fuzzy Hash: b764e0701a423af9379af297aeb6766ca0474a948c07d856b1b46da87d0e8bcf
                                                          • Instruction Fuzzy Hash: E4F1BD315043119FC714EF24D891B6EBBE5BF85328F18855EF8959B2A2CB71EC41CB62
                                                          APIs
                                                          • GetMenuItemCount.USER32(00D71990), ref: 00CE2F8D
                                                          • GetMenuItemCount.USER32(00D71990), ref: 00CE303D
                                                          • GetCursorPos.USER32(?), ref: 00CE3081
                                                          • SetForegroundWindow.USER32(00000000), ref: 00CE308A
                                                          • TrackPopupMenuEx.USER32(00D71990,00000000,?,00000000,00000000,00000000), ref: 00CE309D
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00CE30A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                          • String ID: 0
                                                          • API String ID: 36266755-4108050209
                                                          • Opcode ID: a9887a70c89b5bc31d4a4b7f6847cbc4c82d692ce8a8078fdb648afb3ee71851
                                                          • Instruction ID: ccda7e0bb27ee6fa82106a336eda3367176bb6b20cf6ac65833d6e76b09c4b76
                                                          • Opcode Fuzzy Hash: a9887a70c89b5bc31d4a4b7f6847cbc4c82d692ce8a8078fdb648afb3ee71851
                                                          • Instruction Fuzzy Hash: DF713A31644296BEFB218F66CC49F9ABF68FF01324F244206F524AA1E1C7B1AE50D760
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00D1C4B0
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00D1C4C3
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00D1C4D7
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00D1C4F0
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00D1C533
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00D1C549
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00D1C554
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00D1C584
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00D1C5DC
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00D1C5F0
                                                          • InternetCloseHandle.WININET(00000000), ref: 00D1C5FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                          • String ID:
                                                          • API String ID: 3800310941-3916222277
                                                          • Opcode ID: f332af82a9db512e2624588e08802540656052b813ed23972a9b727a85748470
                                                          • Instruction ID: 940f1c7540467d7382e2b742b9556be814cf3a737c09e071be3feb3d51922dd9
                                                          • Opcode Fuzzy Hash: f332af82a9db512e2624588e08802540656052b813ed23972a9b727a85748470
                                                          • Instruction Fuzzy Hash: 5C5139B1550308BFEB218FA4D988ABB7BBDFF08754F046419F945E6210EB34E9849B70
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 00D11502
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00D1150B
                                                          • VariantClear.OLEAUT32(?), ref: 00D11517
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00D115FB
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 00D11657
                                                          • VariantInit.OLEAUT32(?), ref: 00D11708
                                                          • SysFreeString.OLEAUT32(?), ref: 00D1178C
                                                          • VariantClear.OLEAUT32(?), ref: 00D117D8
                                                          • VariantClear.OLEAUT32(?), ref: 00D117E7
                                                          • VariantInit.OLEAUT32(00000000), ref: 00D11823
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 1234038744-3931177956
                                                          • Opcode ID: a9f4ff62f1fa1bcb21901fd98cf55342844a1ab711fdba238ce5bdbf060756e7
                                                          • Instruction ID: c3dadcc3d7f2e9ccd4c87ba5f62a7f5dc0124d6375d8be9d0007eab191f180c7
                                                          • Opcode Fuzzy Hash: a9f4ff62f1fa1bcb21901fd98cf55342844a1ab711fdba238ce5bdbf060756e7
                                                          • Instruction Fuzzy Hash: 37D11235600615EBEB109F64E885BFDB7B6BF45700F148459E686AB280DF30EC85EB72
                                                          APIs
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                            • Part of subcall function 00D2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D2B6AE,?,?), ref: 00D2C9B5
                                                            • Part of subcall function 00D2C998: _wcslen.LIBCMT ref: 00D2C9F1
                                                            • Part of subcall function 00D2C998: _wcslen.LIBCMT ref: 00D2CA68
                                                            • Part of subcall function 00D2C998: _wcslen.LIBCMT ref: 00D2CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D2B6F4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D2B772
                                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 00D2B80A
                                                          • RegCloseKey.ADVAPI32(?), ref: 00D2B87E
                                                          • RegCloseKey.ADVAPI32(?), ref: 00D2B89C
                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00D2B8F2
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00D2B904
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00D2B922
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00D2B983
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D2B994
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 146587525-4033151799
                                                          • Opcode ID: 01c4354109b1cb76685b72e5a53db132a5562a063fbcd13233f3a286c5e40cdd
                                                          • Instruction ID: bc22ff7871be43ad9630e35b017401a877c4d83c9fd33a2339c6c1d8819a4725
                                                          • Opcode Fuzzy Hash: 01c4354109b1cb76685b72e5a53db132a5562a063fbcd13233f3a286c5e40cdd
                                                          • Instruction Fuzzy Hash: 53C1AC30208212AFD714DF24D495F2ABBE1FF95318F18845DE49A8B2A2CB71EC45DBA1
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00D35504
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D35515
                                                          • CharNextW.USER32(00000158), ref: 00D35544
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00D35585
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00D3559B
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D355AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CharNext
                                                          • String ID: @U=u
                                                          • API String ID: 1350042424-2594219639
                                                          • Opcode ID: 5ac4af71d97416a6c132c8255c4cd284bd17cfc6faf810a5b266b90db8f936f2
                                                          • Instruction ID: 72320c77fa266fa27b0357ca1e9e9371820145a8c8ea4d132eac455f4572114c
                                                          • Opcode Fuzzy Hash: 5ac4af71d97416a6c132c8255c4cd284bd17cfc6faf810a5b266b90db8f936f2
                                                          • Instruction Fuzzy Hash: EF619B75900608EFDF10CF94EC85AFE7BB9EB0A320F148155F965AB2A4D7709A80DB70
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00D225D8
                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00D225E8
                                                          • CreateCompatibleDC.GDI32(?), ref: 00D225F4
                                                          • SelectObject.GDI32(00000000,?), ref: 00D22601
                                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00D2266D
                                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00D226AC
                                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00D226D0
                                                          • SelectObject.GDI32(?,?), ref: 00D226D8
                                                          • DeleteObject.GDI32(?), ref: 00D226E1
                                                          • DeleteDC.GDI32(?), ref: 00D226E8
                                                          • ReleaseDC.USER32(00000000,?), ref: 00D226F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: eab038ff532123ae692a644f821c9f56044b735d37f0f6428666629944032597
                                                          • Instruction ID: 1ba8000686d7f4ff778d514136c2c28d88c18fd0f8a39526703281d3503894a6
                                                          • Opcode Fuzzy Hash: eab038ff532123ae692a644f821c9f56044b735d37f0f6428666629944032597
                                                          • Instruction Fuzzy Hash: E261F176D00219EFCF14CFA8D884AAEBBB6FF48310F208529E955A7350D770A941DFA0
                                                          APIs
                                                          • timeGetTime.WINMM ref: 00D0E6B4
                                                            • Part of subcall function 00CBE551: timeGetTime.WINMM(?,?,00D0E6D4), ref: 00CBE555
                                                          • Sleep.KERNEL32(0000000A), ref: 00D0E6E1
                                                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00D0E705
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00D0E727
                                                          • SetActiveWindow.USER32 ref: 00D0E746
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00D0E754
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00D0E773
                                                          • Sleep.KERNEL32(000000FA), ref: 00D0E77E
                                                          • IsWindow.USER32 ref: 00D0E78A
                                                          • EndDialog.USER32(00000000), ref: 00D0E79B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: @U=u$BUTTON
                                                          • API String ID: 1194449130-2582809321
                                                          • Opcode ID: 89a976dc9143a353d544e9edab0e40fc9ba0c9185e250aae8f42de09b9c78290
                                                          • Instruction ID: 76ebee6333d3adeb6773868d8cdb5ad804ce65cba2feb4f9268f56cabad086fd
                                                          • Opcode Fuzzy Hash: 89a976dc9143a353d544e9edab0e40fc9ba0c9185e250aae8f42de09b9c78290
                                                          • Instruction Fuzzy Hash: 55216FB0210344AFEB006F65EC8AB393B69E794749F541825F50ED13F1EB71AC409B34
                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 00CDDAA1
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD659
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD66B
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD67D
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD68F
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD6A1
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD6B3
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD6C5
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD6D7
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD6E9
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD6FB
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD70D
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD71F
                                                            • Part of subcall function 00CDD63C: _free.LIBCMT ref: 00CDD731
                                                          • _free.LIBCMT ref: 00CDDA96
                                                            • Part of subcall function 00CD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000), ref: 00CD29DE
                                                            • Part of subcall function 00CD29C8: GetLastError.KERNEL32(00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000,00000000), ref: 00CD29F0
                                                          • _free.LIBCMT ref: 00CDDAB8
                                                          • _free.LIBCMT ref: 00CDDACD
                                                          • _free.LIBCMT ref: 00CDDAD8
                                                          • _free.LIBCMT ref: 00CDDAFA
                                                          • _free.LIBCMT ref: 00CDDB0D
                                                          • _free.LIBCMT ref: 00CDDB1B
                                                          • _free.LIBCMT ref: 00CDDB26
                                                          • _free.LIBCMT ref: 00CDDB5E
                                                          • _free.LIBCMT ref: 00CDDB65
                                                          • _free.LIBCMT ref: 00CDDB82
                                                          • _free.LIBCMT ref: 00CDDB9A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: dd6731532c12c81b4af2ce8022cba73fbedebb5e0d48e8a0eef06c1ab5ca8373
                                                          • Instruction ID: 3391ffcc548399693e0afd159a4d7ee267c3f8b4340c564c4755e94fb6436180
                                                          • Opcode Fuzzy Hash: dd6731532c12c81b4af2ce8022cba73fbedebb5e0d48e8a0eef06c1ab5ca8373
                                                          • Instruction Fuzzy Hash: D6314D31A04705AFEB21AA39E845B56B7E9FF10314F15441BF66AD7391DF31ED80A720
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00D0369C
                                                          • _wcslen.LIBCMT ref: 00D036A7
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00D03797
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00D0380C
                                                          • GetDlgCtrlID.USER32(?), ref: 00D0385D
                                                          • GetWindowRect.USER32(?,?), ref: 00D03882
                                                          • GetParent.USER32(?), ref: 00D038A0
                                                          • ScreenToClient.USER32(00000000), ref: 00D038A7
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00D03921
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00D0395D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                          • String ID: %s%u
                                                          • API String ID: 4010501982-679674701
                                                          • Opcode ID: 8744761ee3cb316db3cdc610dd45de803213cd5a379e01a2b74526405574f43f
                                                          • Instruction ID: 48660c12341ea7d92af5bf93798a0a462bcded79d2eee085f79f62a86fb5f6f3
                                                          • Opcode Fuzzy Hash: 8744761ee3cb316db3cdc610dd45de803213cd5a379e01a2b74526405574f43f
                                                          • Instruction Fuzzy Hash: D9918B71204706AFD719DF24D885FAAB7ACFF48350F448629F999D2190DB30EA45CBA1
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00D04994
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00D049DA
                                                          • _wcslen.LIBCMT ref: 00D049EB
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 00D049F7
                                                          • _wcsstr.LIBVCRUNTIME ref: 00D04A2C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00D04A64
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00D04A9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00D04AE6
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00D04B20
                                                          • GetWindowRect.USER32(?,?), ref: 00D04B8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                          • String ID: ThumbnailClass
                                                          • API String ID: 1311036022-1241985126
                                                          • Opcode ID: 4f84d1df224a48ed67b8b02ac0fd8e0529695ac624c7b2abbfcb542d80c540a8
                                                          • Instruction ID: 3a37b2a8794b643f17f9e50291b6fc7faff372ba965a7ac0c1bb30697522b960
                                                          • Opcode Fuzzy Hash: 4f84d1df224a48ed67b8b02ac0fd8e0529695ac624c7b2abbfcb542d80c540a8
                                                          • Instruction Fuzzy Hash: 80918AB21043059BDB14DF14C985FAAB7E8EF84354F088469FE899A1D6EB30ED45CBB1
                                                          APIs
                                                            • Part of subcall function 00CB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CB9BB2
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00D38D5A
                                                          • GetFocus.USER32 ref: 00D38D6A
                                                          • GetDlgCtrlID.USER32(00000000), ref: 00D38D75
                                                          • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00D38E1D
                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00D38ECF
                                                          • GetMenuItemCount.USER32(?), ref: 00D38EEC
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00D38EFC
                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00D38F2E
                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00D38F70
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00D38FA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                          • String ID: 0
                                                          • API String ID: 1026556194-4108050209
                                                          • Opcode ID: 4cbc93597011caf75edb8b4763f8b312b164482626772d101095b93dbe005005
                                                          • Instruction ID: cf074824aa9b9be1e5f6ab47945a49a7ceb48e004585dcd852f7e5fe8e548c06
                                                          • Opcode Fuzzy Hash: 4cbc93597011caf75edb8b4763f8b312b164482626772d101095b93dbe005005
                                                          • Instruction Fuzzy Hash: F7818C71508301AFD720DF24D884AABBBE9FF88354F180A19F995E7291DB71D901EBB1
                                                          APIs
                                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00D0DC20
                                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00D0DC46
                                                          • _wcslen.LIBCMT ref: 00D0DC50
                                                          • _wcsstr.LIBVCRUNTIME ref: 00D0DCA0
                                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00D0DCBC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                          • API String ID: 1939486746-1459072770
                                                          • Opcode ID: 5b8aedd7df7d5f3de187e91cd6a3ba6534214000bd92588f1c0d0e6fc8b2f702
                                                          • Instruction ID: 28547e41a7248da5470c6702ce9d90955411281e3e0da9cee242da1a29258c91
                                                          • Opcode Fuzzy Hash: 5b8aedd7df7d5f3de187e91cd6a3ba6534214000bd92588f1c0d0e6fc8b2f702
                                                          • Instruction Fuzzy Hash: 8E41DD72A403017AEB14A7B4DC47FBF77ACEF56710F14006AF904A62C2EA70DA01A7B4
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00D2CC64
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00D2CC8D
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00D2CD48
                                                            • Part of subcall function 00D2CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00D2CCAA
                                                            • Part of subcall function 00D2CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00D2CCBD
                                                            • Part of subcall function 00D2CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00D2CCCF
                                                            • Part of subcall function 00D2CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00D2CD05
                                                            • Part of subcall function 00D2CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00D2CD28
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00D2CCF3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2734957052-4033151799
                                                          • Opcode ID: 786015e420513302bc408ac20e04b014df72e423c0c411adffb44d5425c1240b
                                                          • Instruction ID: 2de7f78c83ee8677653588e72d810b69fe16008ffac16aa85ee1c9c5bde080ef
                                                          • Opcode Fuzzy Hash: 786015e420513302bc408ac20e04b014df72e423c0c411adffb44d5425c1240b
                                                          • Instruction Fuzzy Hash: 45318E76911228BBDB208B61EC88EFFBB7CEF15744F041165A905E3240DA749E45EBB0
                                                          APIs
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00D0EA5D
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00D0EA73
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D0EA84
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00D0EA96
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00D0EAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: SendString$_wcslen
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2420728520-1007645807
                                                          • Opcode ID: 8aa042ce4880a94f32e88af18aefb914140c9662b26cfe2fb02d93c4aef0d681
                                                          • Instruction ID: d90bb80301aa0cb6218e8d344da907bbd82c2dbe02d09a77e4a81e100cda80c4
                                                          • Opcode Fuzzy Hash: 8aa042ce4880a94f32e88af18aefb914140c9662b26cfe2fb02d93c4aef0d681
                                                          • Instruction Fuzzy Hash: 26117731B902597ED710A762DC4AEFF6B7CEBD6B44F04082AB805A20D1EFB04D09C9B0
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 00D05CE2
                                                          • GetWindowRect.USER32(00000000,?), ref: 00D05CFB
                                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00D05D59
                                                          • GetDlgItem.USER32(?,00000002), ref: 00D05D69
                                                          • GetWindowRect.USER32(00000000,?), ref: 00D05D7B
                                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00D05DCF
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00D05DDD
                                                          • GetWindowRect.USER32(00000000,?), ref: 00D05DEF
                                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00D05E31
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00D05E44
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00D05E5A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00D05E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: f4eec89ef350484919bc692bfa2318abd57f694373f902c7233c6caf09b34371
                                                          • Instruction ID: 465d87c4009b582628dec39f5b57ad86c8075314dca66a6c3334c62878ef157d
                                                          • Opcode Fuzzy Hash: f4eec89ef350484919bc692bfa2318abd57f694373f902c7233c6caf09b34371
                                                          • Instruction Fuzzy Hash: FA51FCB1A10715AFDB18CF68DD89BAEBBB5EB48300F149129F919E7294D7709E04CF60
                                                          APIs
                                                            • Part of subcall function 00CB8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00CB8BE8,?,00000000,?,?,?,?,00CB8BBA,00000000,?), ref: 00CB8FC5
                                                          • DestroyWindow.USER32(?), ref: 00CB8C81
                                                          • KillTimer.USER32(00000000,?,?,?,?,00CB8BBA,00000000,?), ref: 00CB8D1B
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 00CF6973
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00CB8BBA,00000000,?), ref: 00CF69A1
                                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00CB8BBA,00000000,?), ref: 00CF69B8
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00CB8BBA,00000000), ref: 00CF69D4
                                                          • DeleteObject.GDI32(00000000), ref: 00CF69E6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: 22ee5d5c48cc25624b71506e595532fc47157bf5d994e3a1c59ff2caca0c14e3
                                                          • Instruction ID: 761f0040b377e08809a2fcdf57fc1c61f057cfac240b726fc6e3e58734c14270
                                                          • Opcode Fuzzy Hash: 22ee5d5c48cc25624b71506e595532fc47157bf5d994e3a1c59ff2caca0c14e3
                                                          • Instruction Fuzzy Hash: 1861DC75102705DFCB258F28C948BB57BF5FB04312F144618E2669B6A0CB71AEC5EFA1
                                                          APIs
                                                            • Part of subcall function 00CB9944: GetWindowLongW.USER32(?,000000EB), ref: 00CB9952
                                                          • GetSysColor.USER32(0000000F), ref: 00CB9862
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: 687f79a1a4f7c9e6973fed6b7daa3ed6e5a958516e8f0735b7344efa278f91e4
                                                          • Instruction ID: 0e47c3c06878a4c824c67f028d5299e40de8cda3955cbb255db9264bc831aaff
                                                          • Opcode Fuzzy Hash: 687f79a1a4f7c9e6973fed6b7daa3ed6e5a958516e8f0735b7344efa278f91e4
                                                          • Instruction Fuzzy Hash: F0417B31504744AFDB215B389C88BB93BA5EB06320F145619EAB69B2E1D7329942EB21
                                                          APIs
                                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00D35186
                                                          • ShowWindow.USER32(?,00000000), ref: 00D351C7
                                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 00D351CD
                                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00D351D1
                                                            • Part of subcall function 00D36FBA: DeleteObject.GDI32(00000000), ref: 00D36FE6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D3520D
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00D3521A
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00D3524D
                                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00D35287
                                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00D35296
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                          • String ID: @U=u
                                                          • API String ID: 3210457359-2594219639
                                                          • Opcode ID: a344597cfbb26565dfa29f94c175072e10b5e026501038029113c6f06dad5d3f
                                                          • Instruction ID: 8962af9d4dbba6fa28f7a6f9ca7fdbd39df2e76aeb66cd73063f624c0fb66a6c
                                                          • Opcode Fuzzy Hash: a344597cfbb26565dfa29f94c175072e10b5e026501038029113c6f06dad5d3f
                                                          • Instruction Fuzzy Hash: 8651B134A50B08BFEF209F24EC4ABD93BA5FB05361F184111FA19A62E4C775A990DB74
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00CF6890
                                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00CF68A9
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00CF68B9
                                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00CF68D1
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00CF68F2
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00CB8874,00000000,00000000,00000000,000000FF,00000000), ref: 00CF6901
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00CF691E
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00CB8874,00000000,00000000,00000000,000000FF,00000000), ref: 00CF692D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 1268354404-2594219639
                                                          • Opcode ID: f0e1eb7b0d056ca9f3d0f7ae3bb567ffa7f74c46cb2b21f5170359d82c4cb9ed
                                                          • Instruction ID: eb87e14ff9ed5ded551489c0a13ed2e4bbd06ae04357b18022925f288c7b7b95
                                                          • Opcode Fuzzy Hash: f0e1eb7b0d056ca9f3d0f7ae3bb567ffa7f74c46cb2b21f5170359d82c4cb9ed
                                                          • Instruction Fuzzy Hash: CD516974610309AFDB20CF25CC55BAA7BB9EB58750F104518FA66E72A0DB70EA90DB60
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00CEF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00D09717
                                                          • LoadStringW.USER32(00000000,?,00CEF7F8,00000001), ref: 00D09720
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00CEF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00D09742
                                                          • LoadStringW.USER32(00000000,?,00CEF7F8,00000001), ref: 00D09745
                                                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00D09866
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 747408836-2268648507
                                                          • Opcode ID: 367c940e0821cb57f4e8a7bf6c48a164f3ece6c7a64d40be3b93f17af6bd8220
                                                          • Instruction ID: d2adefb47e0059913f3a0af79967a7d52831bb551ff8a09fb69a15a616084ec9
                                                          • Opcode Fuzzy Hash: 367c940e0821cb57f4e8a7bf6c48a164f3ece6c7a64d40be3b93f17af6bd8220
                                                          • Instruction Fuzzy Hash: FC413A7280421AAACF04EBE0DD96EEEB778EF56344F104025F505B21A2EB356F49DB71
                                                          APIs
                                                            • Part of subcall function 00CA6B57: _wcslen.LIBCMT ref: 00CA6B6A
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00D007A2
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00D007BE
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00D007DA
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00D00804
                                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00D0082C
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00D00837
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00D0083C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 323675364-22481851
                                                          • Opcode ID: 93db61a4246c1549138666896e73e521a92a7514bfb83369150d0e8b457cea9e
                                                          • Instruction ID: 5a26cce277adeae298332fe37dd9573856a3d5e51147b8dd3eab493e2db2f02d
                                                          • Opcode Fuzzy Hash: 93db61a4246c1549138666896e73e521a92a7514bfb83369150d0e8b457cea9e
                                                          • Instruction Fuzzy Hash: 5C41F772C10229ABDF15EBA4DC959EEB778FF44354F044129E905B32A1EB349E44DFA0
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00D23C5C
                                                          • CoInitialize.OLE32(00000000), ref: 00D23C8A
                                                          • CoUninitialize.OLE32 ref: 00D23C94
                                                          • _wcslen.LIBCMT ref: 00D23D2D
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00D23DB1
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00D23ED5
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00D23F0E
                                                          • CoGetObject.OLE32(?,00000000,00D3FB98,?), ref: 00D23F2D
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00D23F40
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00D23FC4
                                                          • VariantClear.OLEAUT32(?), ref: 00D23FD8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                          • String ID:
                                                          • API String ID: 429561992-0
                                                          • Opcode ID: ddcc5ef78c7fd59c937aebfcb5f4e68c6b0eae3d510c6de0ab943fc6fd90d5bc
                                                          • Instruction ID: 970f68a6ca11f1229a70018133e95470c6733876e1be53089ce5f8429712bb19
                                                          • Opcode Fuzzy Hash: ddcc5ef78c7fd59c937aebfcb5f4e68c6b0eae3d510c6de0ab943fc6fd90d5bc
                                                          • Instruction Fuzzy Hash: E6C14471608315AFC700DF68D88492BBBE9FF99748F04495DF98A9B210D735EE05CB62
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00D17AF3
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00D17B8F
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 00D17BA3
                                                          • CoCreateInstance.OLE32(00D3FD08,00000000,00000001,00D66E6C,?), ref: 00D17BEF
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00D17C74
                                                          • CoTaskMemFree.OLE32(?,?), ref: 00D17CCC
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00D17D57
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00D17D7A
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00D17D81
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00D17DD6
                                                          • CoUninitialize.OLE32 ref: 00D17DDC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                          • String ID:
                                                          • API String ID: 2762341140-0
                                                          • Opcode ID: 13f543bf99bef56ea7e08f8a73eb4671a27b115dd48519b0b3e24f8c845a5ec2
                                                          • Instruction ID: af2565c1fe30a6c7b5a2e406ea2689bd38f6dce068c8e8197fb8ad021e922934
                                                          • Opcode Fuzzy Hash: 13f543bf99bef56ea7e08f8a73eb4671a27b115dd48519b0b3e24f8c845a5ec2
                                                          • Instruction Fuzzy Hash: 95C10A75A04209AFCB14DFA4D884DAEBBF5FF48314B148499E516DB361DB30EE85CBA0
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00CFFAAF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00CFFB08
                                                          • VariantInit.OLEAUT32(?), ref: 00CFFB1A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00CFFB3A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00CFFB8D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00CFFBA1
                                                          • VariantClear.OLEAUT32(?), ref: 00CFFBB6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00CFFBC3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00CFFBCC
                                                          • VariantClear.OLEAUT32(?), ref: 00CFFBDE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00CFFBE9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: a2598741ca4a011104574fc29859c7926ef447d58185d06e9a314533ea1284a5
                                                          • Instruction ID: ed1f858ebcc4b49b22275ccf6498c6e8de1140f1be4f7a6c5a3af1ea3ed9aff1
                                                          • Opcode Fuzzy Hash: a2598741ca4a011104574fc29859c7926ef447d58185d06e9a314533ea1284a5
                                                          • Instruction Fuzzy Hash: 28412035A0021D9FCB10DFA4D8549FEBBB9EF48354F008069E955E7361DB30A946DBA1
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00D09CA1
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00D09D22
                                                          • GetKeyState.USER32(000000A0), ref: 00D09D3D
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00D09D57
                                                          • GetKeyState.USER32(000000A1), ref: 00D09D6C
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00D09D84
                                                          • GetKeyState.USER32(00000011), ref: 00D09D96
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00D09DAE
                                                          • GetKeyState.USER32(00000012), ref: 00D09DC0
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00D09DD8
                                                          • GetKeyState.USER32(0000005B), ref: 00D09DEA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 8470b94497d9da61ddc0451c1409fcaab9668525f410ee01a01752b7be440b50
                                                          • Instruction ID: 13ba441eb4f1c1b7965baad346f858eb9f0614d61f665dc165530e12161c3a8b
                                                          • Opcode Fuzzy Hash: 8470b94497d9da61ddc0451c1409fcaab9668525f410ee01a01752b7be440b50
                                                          • Instruction Fuzzy Hash: 0A4196349447C969FF319764C8243B5FEA06B51344F0C805ADACA566C3EBA59DC8C7B2
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00D205BC
                                                          • inet_addr.WSOCK32(?), ref: 00D2061C
                                                          • gethostbyname.WSOCK32(?), ref: 00D20628
                                                          • IcmpCreateFile.IPHLPAPI ref: 00D20636
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00D206C6
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00D206E5
                                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 00D207B9
                                                          • WSACleanup.WSOCK32 ref: 00D207BF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: a24c2f0cdf8d7653d5261637dcf9bdef593f2d5f7b62f281aee5a6274e8f92dc
                                                          • Instruction ID: 8ac7d59377c31ad2aff0e339b07f9f7a2d0f42b2b179f811984d4aa47148881b
                                                          • Opcode Fuzzy Hash: a24c2f0cdf8d7653d5261637dcf9bdef593f2d5f7b62f281aee5a6274e8f92dc
                                                          • Instruction Fuzzy Hash: 10917A756083119FD320DF15D889F1ABBE0AF54318F1885A9E4A99B7A3C730ED45CFA1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharLower
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 707087890-567219261
                                                          • Opcode ID: d1045b417f3a603548cc64522e61d18d6cee3bce4734fee67f64e0a337f9c0da
                                                          • Instruction ID: f34fdba10b3b163cd9122447bf491874f8b4787da17cd7bff6046d6157645470
                                                          • Opcode Fuzzy Hash: d1045b417f3a603548cc64522e61d18d6cee3bce4734fee67f64e0a337f9c0da
                                                          • Instruction Fuzzy Hash: 3D51C331A051269BCB14DF68D8409BEB3A5BF75328B294229F466E72C4DB32DD44E7A0
                                                          APIs
                                                          • CoInitialize.OLE32 ref: 00D23774
                                                          • CoUninitialize.OLE32 ref: 00D2377F
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00D3FB78,?), ref: 00D237D9
                                                          • IIDFromString.OLE32(?,?), ref: 00D2384C
                                                          • VariantInit.OLEAUT32(?), ref: 00D238E4
                                                          • VariantClear.OLEAUT32(?), ref: 00D23936
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 636576611-1287834457
                                                          • Opcode ID: 0cd23cb9de80bafee751b443558c84f6b31633c97a2983d89adc185a240431a0
                                                          • Instruction ID: ce3bf49ae009b0ed66929dfa9d49e8edffe2867010b3a33919931d782432e2ed
                                                          • Opcode Fuzzy Hash: 0cd23cb9de80bafee751b443558c84f6b31633c97a2983d89adc185a240431a0
                                                          • Instruction Fuzzy Hash: DB61BF70608321AFD710DF64E849B5ABBE8EF59718F040909F9859B291D774EE48CBB2
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00CA5C7A
                                                            • Part of subcall function 00CA5D0A: GetClientRect.USER32(?,?), ref: 00CA5D30
                                                            • Part of subcall function 00CA5D0A: GetWindowRect.USER32(?,?), ref: 00CA5D71
                                                            • Part of subcall function 00CA5D0A: ScreenToClient.USER32(?,?), ref: 00CA5D99
                                                          • GetDC.USER32 ref: 00CE46F5
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00CE4708
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00CE4716
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00CE472B
                                                          • ReleaseDC.USER32(?,00000000), ref: 00CE4733
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00CE47C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: @U=u$U
                                                          • API String ID: 4009187628-4110099822
                                                          • Opcode ID: a4f053b2ac8b27f2286fd5a47e13b09c2c060399c35c373d4a38fd7bbe0aa577
                                                          • Instruction ID: 06076ad739e324b03aa861ed1650f96a8999acaf462a2a59356371d4b29e1c11
                                                          • Opcode Fuzzy Hash: a4f053b2ac8b27f2286fd5a47e13b09c2c060399c35c373d4a38fd7bbe0aa577
                                                          • Instruction Fuzzy Hash: 50710634400345DFCF298F65C984ABA7BB5FF4A364F144269FD659A2AAC3308D41DFA0
                                                          APIs
                                                            • Part of subcall function 00CB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CB9BB2
                                                            • Part of subcall function 00CB912D: GetCursorPos.USER32(?), ref: 00CB9141
                                                            • Part of subcall function 00CB912D: ScreenToClient.USER32(00000000,?), ref: 00CB915E
                                                            • Part of subcall function 00CB912D: GetAsyncKeyState.USER32(00000001), ref: 00CB9183
                                                            • Part of subcall function 00CB912D: GetAsyncKeyState.USER32(00000002), ref: 00CB919D
                                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00D38B6B
                                                          • ImageList_EndDrag.COMCTL32 ref: 00D38B71
                                                          • ReleaseCapture.USER32 ref: 00D38B77
                                                          • SetWindowTextW.USER32(?,00000000), ref: 00D38C12
                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00D38C25
                                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00D38CFF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID$@U=u
                                                          • API String ID: 1924731296-2104563098
                                                          • Opcode ID: 579944b0c49d88682fb4f448c1d5c2daac5da2008fe14d9b893d4bcbe2640d0d
                                                          • Instruction ID: 7526c5561be6701ba8a1a797344fb37bc4aec0ad3c12979953aaa98792b1c508
                                                          • Opcode Fuzzy Hash: 579944b0c49d88682fb4f448c1d5c2daac5da2008fe14d9b893d4bcbe2640d0d
                                                          • Instruction Fuzzy Hash: 38517875204304AFD704DF24CC96FAA77E4FB88714F040629FA96A72A1DB70A944DBB2
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00D133CF
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00D133F0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-3080491070
                                                          • Opcode ID: 01f8062da511b00488f399fa3b1611c992196f985f9da6c2919c2a05ab77151c
                                                          • Instruction ID: f8da424bfac55d2d3d75a471ed80c33cdf421261dde8d46e98d90ad4595b222e
                                                          • Opcode Fuzzy Hash: 01f8062da511b00488f399fa3b1611c992196f985f9da6c2919c2a05ab77151c
                                                          • Instruction Fuzzy Hash: E9518A7190020AABDF14EBA0DD56EEEB779EF05344F144165B409B21A2EF316F98EB70
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 1256254125-769500911
                                                          • Opcode ID: 15f1c13ff0d1baf1a5227618448814ddfab02961aefda155df419e4007b0501f
                                                          • Instruction ID: c05827b3bb8bdddf876c6fb1e7d8b8184676a9213727315126b74d763fa8397a
                                                          • Opcode Fuzzy Hash: 15f1c13ff0d1baf1a5227618448814ddfab02961aefda155df419e4007b0501f
                                                          • Instruction Fuzzy Hash: 8841A932A041279BCB105F7DC8906BE77A5ABA1774B68412BE469DF2C4E732CD81C7B0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00D153A0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00D15416
                                                          • GetLastError.KERNEL32 ref: 00D15420
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00D154A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 68a1f5d57d8e0557460eb0f9f216096b02801937d55b1263eb8cf2318db64255
                                                          • Instruction ID: e79221216e1171f0da7175795484c21bd4d2c91bd9110efa5182e1f94404c6cd
                                                          • Opcode Fuzzy Hash: 68a1f5d57d8e0557460eb0f9f216096b02801937d55b1263eb8cf2318db64255
                                                          • Instruction Fuzzy Hash: 5F318F35A00605EFC710DF68E484AEABBB4EB85309F188065E406DB396DB75DDC6CBB0
                                                          APIs
                                                          • CreateMenu.USER32 ref: 00D33C79
                                                          • SetMenu.USER32(?,00000000), ref: 00D33C88
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D33D10
                                                          • IsMenu.USER32(?), ref: 00D33D24
                                                          • CreatePopupMenu.USER32 ref: 00D33D2E
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00D33D5B
                                                          • DrawMenuBar.USER32 ref: 00D33D63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                          • String ID: 0$F
                                                          • API String ID: 161812096-3044882817
                                                          • Opcode ID: cbb2be3d48b38b39274038241e0ed72eac28c9f85b7a01ace4a0c1728c276703
                                                          • Instruction ID: 882e5b97f4070250a48093f47d222bde6bf1cd192cffb8cec7373f5742bf7880
                                                          • Opcode Fuzzy Hash: cbb2be3d48b38b39274038241e0ed72eac28c9f85b7a01ace4a0c1728c276703
                                                          • Instruction Fuzzy Hash: FD413979A01309AFDB14CF64E944AAA7BB5FF49350F180029F956E7360D770AA11CFA4
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00D32D1B
                                                          • GetDC.USER32(00000000), ref: 00D32D23
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D32D2E
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00D32D3A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00D32D76
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00D32D87
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00D35A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00D32DC2
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00D32DE1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID: @U=u
                                                          • API String ID: 3864802216-2594219639
                                                          • Opcode ID: 6598331dbc36185a4a0ac4279affd76f95968d8a302c3a20657e1dfa65e5d691
                                                          • Instruction ID: abcc1b484913d2b6f1a7384ac143e4ae77820973843b0b775c66fef91755ba6e
                                                          • Opcode Fuzzy Hash: 6598331dbc36185a4a0ac4279affd76f95968d8a302c3a20657e1dfa65e5d691
                                                          • Instruction Fuzzy Hash: DD316B72211614BBEB218F50DC8AFFB3BA9EB09755F084055FE08EA2A1D6759C50CBB4
                                                          APIs
                                                          • GetParent.USER32 ref: 00D020AB
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00D020C0
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00D0214D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend
                                                          • String ID: @U=u$SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1290815626-1428604138
                                                          • Opcode ID: 8cd644abc4e74c4ac351689e69171387f15ce6e3ca9b881555f15c5f822757a4
                                                          • Instruction ID: 148db872b8e915e3339cd509ec82c102d55e30c959672e2b0a069e9a09c954b0
                                                          • Opcode Fuzzy Hash: 8cd644abc4e74c4ac351689e69171387f15ce6e3ca9b881555f15c5f822757a4
                                                          • Instruction Fuzzy Hash: CB113676288306BAFA192224EC0BFB6739CCB05324F20001AFB4CA50E5EA61A8466635
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00D33A9D
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00D33AA0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D33AC7
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D33AEA
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00D33B62
                                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00D33BAC
                                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00D33BC7
                                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00D33BE2
                                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00D33BF6
                                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00D33C13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow
                                                          • String ID:
                                                          • API String ID: 312131281-0
                                                          • Opcode ID: fd47e767b536d9d5aae88730d273a5bbb00b5a1110a65231c99f5a0c4a5d5af0
                                                          • Instruction ID: b9c29cd0babe19cf4d3f005780acd3dda98580b0e95029bf2081cad9526d9ca3
                                                          • Opcode Fuzzy Hash: fd47e767b536d9d5aae88730d273a5bbb00b5a1110a65231c99f5a0c4a5d5af0
                                                          • Instruction Fuzzy Hash: 82615A75900248AFDB10DFA8CD81EEE77B8EB09700F144199FA15E73A1D774AE85DB60
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00D0B151
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00D0A1E1,?,00000001), ref: 00D0B165
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00D0B16C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00D0A1E1,?,00000001), ref: 00D0B17B
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00D0B18D
                                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00D0A1E1,?,00000001), ref: 00D0B1A6
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00D0A1E1,?,00000001), ref: 00D0B1B8
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00D0A1E1,?,00000001), ref: 00D0B1FD
                                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00D0A1E1,?,00000001), ref: 00D0B212
                                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00D0A1E1,?,00000001), ref: 00D0B21D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 97795198cd34de458a1a2b3ce42cd0a84917d900b3a283fafcfecab49b611149
                                                          • Instruction ID: 71f981aa0faba7f0d5a4ab237ae57da3202c48dacb0b696662d3409c15299774
                                                          • Opcode Fuzzy Hash: 97795198cd34de458a1a2b3ce42cd0a84917d900b3a283fafcfecab49b611149
                                                          • Instruction Fuzzy Hash: FD319C71614304BFDB109F24DC49B6D7BA9BB61321F145416FA09E73E0E7B49A808F79
                                                          APIs
                                                          • _free.LIBCMT ref: 00CD2C94
                                                            • Part of subcall function 00CD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000), ref: 00CD29DE
                                                            • Part of subcall function 00CD29C8: GetLastError.KERNEL32(00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000,00000000), ref: 00CD29F0
                                                          • _free.LIBCMT ref: 00CD2CA0
                                                          • _free.LIBCMT ref: 00CD2CAB
                                                          • _free.LIBCMT ref: 00CD2CB6
                                                          • _free.LIBCMT ref: 00CD2CC1
                                                          • _free.LIBCMT ref: 00CD2CCC
                                                          • _free.LIBCMT ref: 00CD2CD7
                                                          • _free.LIBCMT ref: 00CD2CE2
                                                          • _free.LIBCMT ref: 00CD2CED
                                                          • _free.LIBCMT ref: 00CD2CFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: dcf52a5746fe457c68cec829c53de3cad386514a828de01cffe4630c756aa279
                                                          • Instruction ID: a7dd70824550489c368a2d13fa02ebb941302ace938b5c2744ec2bea9412f21f
                                                          • Opcode Fuzzy Hash: dcf52a5746fe457c68cec829c53de3cad386514a828de01cffe4630c756aa279
                                                          • Instruction Fuzzy Hash: 26119376100108BFCB02EF54D892CDD3BA5FF15350F4144A6FA489B322DA31EE50BB90
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00CA1459
                                                          • OleUninitialize.OLE32(?,00000000), ref: 00CA14F8
                                                          • UnregisterHotKey.USER32(?), ref: 00CA16DD
                                                          • DestroyWindow.USER32(?), ref: 00CE24B9
                                                          • FreeLibrary.KERNEL32(?), ref: 00CE251E
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00CE254B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: 95a2e6d13392de0ef27148084f046ac659a71a8f44d6402ed518d7a621c43ef7
                                                          • Instruction ID: 9dc60aca8246a7c830ded049da99e5b2c8517db9bccabc5791043959cca6ceae
                                                          • Opcode Fuzzy Hash: 95a2e6d13392de0ef27148084f046ac659a71a8f44d6402ed518d7a621c43ef7
                                                          • Instruction Fuzzy Hash: 34D15F31702252CFCB19EF16C995B69F7A4BF06704F1942ADE84AAB251DB30ED12DF60
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00D135E4
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                          • LoadStringW.USER32(00D72390,?,00000FFF,?), ref: 00D1360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-2391861430
                                                          • Opcode ID: f1d55faf13814f727a3bd6f85cacd427fb93a72332ff98b492be6f84e23a92fc
                                                          • Instruction ID: aaa7347da913501f59e72958ca470936c50989a7917d128759c450cebab9dd5b
                                                          • Opcode Fuzzy Hash: f1d55faf13814f727a3bd6f85cacd427fb93a72332ff98b492be6f84e23a92fc
                                                          • Instruction Fuzzy Hash: C7516C7190021ABBDF15EBA0DC52EEEBB38EF05344F144125F105721A2EB306A99EBB0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00D33925
                                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00D3393A
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00D33954
                                                          • _wcslen.LIBCMT ref: 00D33999
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00D339C6
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00D339F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcslen
                                                          • String ID: @U=u$SysListView32
                                                          • API String ID: 2147712094-1908207174
                                                          • Opcode ID: bd0f9eaf6ffc9e87797e824b115b7f40718327840f5da3ede7beb5f5fb4d1905
                                                          • Instruction ID: 4b97dfdb7b6d28cdc3dce10fb7f40028d0d2c5c25cca24106e89eb2fb667b5d4
                                                          • Opcode Fuzzy Hash: bd0f9eaf6ffc9e87797e824b115b7f40718327840f5da3ede7beb5f5fb4d1905
                                                          • Instruction Fuzzy Hash: C741A271A00319ABEB219F64CC45FEA77A9FF08354F140526F958E7291D7B1D984CBB0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00D32E1C
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00D32E4F
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00D32E84
                                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00D32EB6
                                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00D32EE0
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00D32EF1
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00D32F0B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 2178440468-2594219639
                                                          • Opcode ID: 5432cf751552a2084b7b05e60723376bcae83ed7bfe52ffc73ac21a54dfc7f7a
                                                          • Instruction ID: 1e9336710399018c01d1f5894496ecccf337bedb4a72c34923cf345dc9eba91a
                                                          • Opcode Fuzzy Hash: 5432cf751552a2084b7b05e60723376bcae83ed7bfe52ffc73ac21a54dfc7f7a
                                                          • Instruction Fuzzy Hash: AB310435A04250AFDB21CF58DC86F6537E1FB8AB10F191164FA14EF2B1CB71A881DB61
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00D1C272
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00D1C29A
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00D1C2CA
                                                          • GetLastError.KERNEL32 ref: 00D1C322
                                                          • SetEvent.KERNEL32(?), ref: 00D1C336
                                                          • InternetCloseHandle.WININET(00000000), ref: 00D1C341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: 8df770c33595cc4f712f749451066d71de6e84f7f4d7075466b7faa1fe612a41
                                                          • Instruction ID: 85b8de02a8be8b3d845b9fefcfe4caa5b8d69fd6b31e72912b173536b2ae2f66
                                                          • Opcode Fuzzy Hash: 8df770c33595cc4f712f749451066d71de6e84f7f4d7075466b7faa1fe612a41
                                                          • Instruction Fuzzy Hash: AB3191B1550304BFD7219F65AC88AAB7BFCEB49740B14A51DF496D2210DF30DD849B70
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00CE3AAF,?,?,Bad directive syntax error,00D3CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00D098BC
                                                          • LoadStringW.USER32(00000000,?,00CE3AAF,?), ref: 00D098C3
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00D09987
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 858772685-4153970271
                                                          • Opcode ID: 411bde83c87c7db9451c05fe1643550dfc1ca78909ea0accb6d7a33c11dfb8f8
                                                          • Instruction ID: 66a45f3c581181a7afc0bc65a7c60b66b1bdd88c4cfb4fc3cb1273781fd9093f
                                                          • Opcode Fuzzy Hash: 411bde83c87c7db9451c05fe1643550dfc1ca78909ea0accb6d7a33c11dfb8f8
                                                          • Instruction Fuzzy Hash: 5D219132D4421AAFCF11EF90CC16EEE7735FF19304F045419F519620A2EB71A618EB60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                          • String ID:
                                                          • API String ID: 1282221369-0
                                                          • Opcode ID: 796c2ca01cfb0ab6c014a8eb6517441a4f14b751c77c9ced7f14605a0d57a4f3
                                                          • Instruction ID: 800fb2c067364976142690cd421b6c0280863bf80164b2354187e09d624f471f
                                                          • Opcode Fuzzy Hash: 796c2ca01cfb0ab6c014a8eb6517441a4f14b751c77c9ced7f14605a0d57a4f3
                                                          • Instruction Fuzzy Hash: 6D610671904312AFDB21AFF4D8C5AAA7BA5AF05320F04416FFB55D7382E6319A41E760
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00D1C182
                                                          • GetLastError.KERNEL32 ref: 00D1C195
                                                          • SetEvent.KERNEL32(?), ref: 00D1C1A9
                                                            • Part of subcall function 00D1C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00D1C272
                                                            • Part of subcall function 00D1C253: GetLastError.KERNEL32 ref: 00D1C322
                                                            • Part of subcall function 00D1C253: SetEvent.KERNEL32(?), ref: 00D1C336
                                                            • Part of subcall function 00D1C253: InternetCloseHandle.WININET(00000000), ref: 00D1C341
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 337547030-0
                                                          • Opcode ID: a51343d21edee0d9e8241ba41b3cf785b1e3f836aa3406af9a4310086e55a3b2
                                                          • Instruction ID: 7d5d99584183a2f707639089785c343bbf2406602882b5c94da22087faad74f5
                                                          • Opcode Fuzzy Hash: a51343d21edee0d9e8241ba41b3cf785b1e3f836aa3406af9a4310086e55a3b2
                                                          • Instruction Fuzzy Hash: 7931AE712A1701BFDB219FA5EC04AABBBF8FF18300B04641DF996D6611DB30E8949B70
                                                          APIs
                                                            • Part of subcall function 00D03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D03A57
                                                            • Part of subcall function 00D03A3D: GetCurrentThreadId.KERNEL32 ref: 00D03A5E
                                                            • Part of subcall function 00D03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00D025B3), ref: 00D03A65
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D025BD
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00D025DB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00D025DF
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D025E9
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00D02601
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00D02605
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D0260F
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00D02623
                                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00D02627
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: fedf4b115af0eefca71d6ce3c1ab1e9e725aba8a21df03d1e33186baa7a40726
                                                          • Instruction ID: 7ea3df334ec29614039bc6419f3e2d03c033b0f27debc5c3f3b264f6d6804592
                                                          • Opcode Fuzzy Hash: fedf4b115af0eefca71d6ce3c1ab1e9e725aba8a21df03d1e33186baa7a40726
                                                          • Instruction Fuzzy Hash: 1C01B1313A0310BBFB1067699C8EF593E59DB5AB12F101001F358EE1E1C9E264449A79
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00D01449,?,?,00000000), ref: 00D0180C
                                                          • HeapAlloc.KERNEL32(00000000,?,00D01449,?,?,00000000), ref: 00D01813
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00D01449,?,?,00000000), ref: 00D01828
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00D01449,?,?,00000000), ref: 00D01830
                                                          • DuplicateHandle.KERNEL32(00000000,?,00D01449,?,?,00000000), ref: 00D01833
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00D01449,?,?,00000000), ref: 00D01843
                                                          • GetCurrentProcess.KERNEL32(00D01449,00000000,?,00D01449,?,?,00000000), ref: 00D0184B
                                                          • DuplicateHandle.KERNEL32(00000000,?,00D01449,?,?,00000000), ref: 00D0184E
                                                          • CreateThread.KERNEL32(00000000,00000000,00D01874,00000000,00000000,00000000), ref: 00D01868
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 9dabeed0a30c5adbe5a6805c3a69b40e8d5ab9fa98c7470cabb658fa4e31e5a9
                                                          • Instruction ID: 2780c21e59d3e840d37f6f4857b0e6aae269685854a3fa536563e113dc699e25
                                                          • Opcode Fuzzy Hash: 9dabeed0a30c5adbe5a6805c3a69b40e8d5ab9fa98c7470cabb658fa4e31e5a9
                                                          • Instruction Fuzzy Hash: 4F01BBB5250308BFE710ABA5DC4DF6B3BACEB89B11F009411FA05EB2A1CA70D810DB30
                                                          APIs
                                                            • Part of subcall function 00D0D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00D0D501
                                                            • Part of subcall function 00D0D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00D0D50F
                                                            • Part of subcall function 00D0D4DC: CloseHandle.KERNEL32(00000000), ref: 00D0D5DC
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00D2A16D
                                                          • GetLastError.KERNEL32 ref: 00D2A180
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00D2A1B3
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00D2A268
                                                          • GetLastError.KERNEL32(00000000), ref: 00D2A273
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D2A2C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: bd43f9378056aabae38ce5f811021c5facbcfc4018c3a4a19ed0bbaeac219ec6
                                                          • Instruction ID: 9c2da6944fdc9e05673dcac72182b05da6c4888ad2328cbbfa4f20c3aea017e3
                                                          • Opcode Fuzzy Hash: bd43f9378056aabae38ce5f811021c5facbcfc4018c3a4a19ed0bbaeac219ec6
                                                          • Instruction Fuzzy Hash: 9E617B302042529FD720DF18D894F15BBA1EF5531CF19849CE46A8B7A3C772EC45CBA6
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D0BCFD
                                                          • IsMenu.USER32(00000000), ref: 00D0BD1D
                                                          • CreatePopupMenu.USER32 ref: 00D0BD53
                                                          • GetMenuItemCount.USER32(011658A8), ref: 00D0BDA4
                                                          • InsertMenuItemW.USER32(011658A8,?,00000001,00000030), ref: 00D0BDCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                          • String ID: 0$2
                                                          • API String ID: 93392585-3793063076
                                                          • Opcode ID: 76e241556fbd9c52c0d69b61439a2786121ac165c07adc9d3703be3293910aa8
                                                          • Instruction ID: 01302db1e09cce9f5bf6a124c4402e1b7c131a5f66cc317667e668675c6ec278
                                                          • Opcode Fuzzy Hash: 76e241556fbd9c52c0d69b61439a2786121ac165c07adc9d3703be3293910aa8
                                                          • Instruction Fuzzy Hash: 80518F70A08206DBDB10DFA9D884BAEFBF4EF45324F18425AE45AE72D1E7709941CB71
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00CFF3AB,00000000,?,?,00000000,?,00CF682C,00000004,00000000,00000000), ref: 00D3824C
                                                          • EnableWindow.USER32(00000000,00000000), ref: 00D38272
                                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00D382D1
                                                          • ShowWindow.USER32(00000000,00000004), ref: 00D382E5
                                                          • EnableWindow.USER32(00000000,00000001), ref: 00D3830B
                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00D3832F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 642888154-2594219639
                                                          • Opcode ID: ff304004494824cfc8796788594f8583ea073a04add3fe20b338e00038619c97
                                                          • Instruction ID: a2295e4b097e3b518d5a8dd074473de6706daf65f8af990c985d572e69c08675
                                                          • Opcode Fuzzy Hash: ff304004494824cfc8796788594f8583ea073a04add3fe20b338e00038619c97
                                                          • Instruction Fuzzy Hash: F9418238601744AFDB11CF15CC99BA57BE0BB0A715F185269FA189B362CB31A841DF74
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00D04C95
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00D04CB2
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00D04CEA
                                                          • _wcslen.LIBCMT ref: 00D04D08
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00D04D10
                                                          • _wcsstr.LIBVCRUNTIME ref: 00D04D1A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                          • String ID: @U=u
                                                          • API String ID: 72514467-2594219639
                                                          • Opcode ID: 9db07474b66e378798cf82fa3a799f3ea499a00c962ca144489b6f5da8723d1d
                                                          • Instruction ID: 5995524bce0c381c5b3413c5682a2d18134a55fa23be86879e596bfceecec5bc
                                                          • Opcode Fuzzy Hash: 9db07474b66e378798cf82fa3a799f3ea499a00c962ca144489b6f5da8723d1d
                                                          • Instruction Fuzzy Hash: 6921D4B2204240BBEB259B39EC4AF7B7B9CDF45750F14802DF909DA2A1EA61DD0197B0
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 00D0C913
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: 0507de4b54e2545bbb24235a4f5eacfd78ed76e0a986fef6d6cd6757dd9fcd9b
                                                          • Instruction ID: 5d958c48a550466da9f7f812212bd862e74f9c9596fe14f783b1ab1ee32669fa
                                                          • Opcode Fuzzy Hash: 0507de4b54e2545bbb24235a4f5eacfd78ed76e0a986fef6d6cd6757dd9fcd9b
                                                          • Instruction Fuzzy Hash: 30113D31699306BFE7089B14EC83FAA379CDF15315B20512EF908A62C2D770DD006678
                                                          APIs
                                                          • GetClientRect.USER32(?), ref: 00CF7452
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 00CF7469
                                                          • GetWindowDC.USER32(?), ref: 00CF7475
                                                          • GetPixel.GDI32(00000000,?,?), ref: 00CF7484
                                                          • ReleaseDC.USER32(?,00000000), ref: 00CF7496
                                                          • GetSysColor.USER32(00000005), ref: 00CF74B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                          • String ID: @U=u
                                                          • API String ID: 272304278-2594219639
                                                          • Opcode ID: 3ac0e1bc85ffa09283a60b023ac6e26c9dadf150b848529214d535bd645644c9
                                                          • Instruction ID: 9bd3520be954a6e5d1fa44c0ab259cb43c9e29a462735e61a0b36879924a01d6
                                                          • Opcode Fuzzy Hash: 3ac0e1bc85ffa09283a60b023ac6e26c9dadf150b848529214d535bd645644c9
                                                          • Instruction Fuzzy Hash: 24012831410619EFEB515FA4DC09BAA7BB5FB04311F511164FA25E22B1CB311E51EF61
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$LocalTime
                                                          • String ID:
                                                          • API String ID: 952045576-0
                                                          • Opcode ID: b61169e058be06b896f2ec9ca0f14a630694cea23880a2088080e9a0713cf79a
                                                          • Instruction ID: bf96c8f69aadfa4f9ecb62e1e4ef55a9ecdd8899cadcecf18c262d02e5a944cc
                                                          • Opcode Fuzzy Hash: b61169e058be06b896f2ec9ca0f14a630694cea23880a2088080e9a0713cf79a
                                                          • Instruction Fuzzy Hash: 9D418065C1021875CB11EBB4C88AFDFB7ACAF45710F50886AF518E3161FB34E655C3A5
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00CF682C,00000004,00000000,00000000), ref: 00CBF953
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00CF682C,00000004,00000000,00000000), ref: 00CFF3D1
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00CF682C,00000004,00000000,00000000), ref: 00CFF454
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 04de17bff5c0b72367b505fb9520c557831770e473f88d02bf1f075156c64cb9
                                                          • Instruction ID: 314d6e328ac1a10e2f26a15b0179420cae324b294d53e2eca6b7496ed179a8f8
                                                          • Opcode Fuzzy Hash: 04de17bff5c0b72367b505fb9520c557831770e473f88d02bf1f075156c64cb9
                                                          • Instruction Fuzzy Hash: E8412A31A08744FAC7798B2D8C887BA7B91EF56310F14453CE1A792770D631AA83DB21
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: c391786bedb5dee59a38ff56f618c136ff2af865908de530d546fc030b73bfbe
                                                          • Instruction ID: cfcc35b43fc1aa386b25ff1c0cb93b7e49d3ab0a9728132156c0f669e13b5cc2
                                                          • Opcode Fuzzy Hash: c391786bedb5dee59a38ff56f618c136ff2af865908de530d546fc030b73bfbe
                                                          • Instruction Fuzzy Hash: 1A21AA61A40A09BBD3145611EE82FBB335CAF62384F8C0024FD0D5A5C6F762ED149DB5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: 13ee29caa26bf583d84c5b0ffa5d1f5bb0c61a1a409a558de67c23692b900b8d
                                                          • Instruction ID: 2ab83370184216f314af79970a30e57e1a8a019d687641559ec4286910d05abe
                                                          • Opcode Fuzzy Hash: 13ee29caa26bf583d84c5b0ffa5d1f5bb0c61a1a409a558de67c23692b900b8d
                                                          • Instruction Fuzzy Hash: 21D1A171A0061A9FDF10CF98E880FAEB7B5BF58348F188069E915AB285D771DD45CBB0
                                                          APIs
                                                          • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00CE17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00CE15CE
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00CE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00CE1651
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00CE17FB,?,00CE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00CE16E4
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00CE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00CE16FB
                                                            • Part of subcall function 00CD3820: RtlAllocateHeap.NTDLL(00000000,?,00D71444,?,00CBFDF5,?,?,00CAA976,00000010,00D71440,00CA13FC,?,00CA13C6,?,00CA1129), ref: 00CD3852
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00CE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00CE1777
                                                          • __freea.LIBCMT ref: 00CE17A2
                                                          • __freea.LIBCMT ref: 00CE17AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                          • String ID:
                                                          • API String ID: 2829977744-0
                                                          • Opcode ID: f9a8f598a9f23ccf5bfa512142b6503206cdbf9afaf3a7f0b25f9522836bda67
                                                          • Instruction ID: 8c6d5db0a73fc4aa5fdd8828b8f6b7841e577139c1dcca7652a763628243a97a
                                                          • Opcode Fuzzy Hash: f9a8f598a9f23ccf5bfa512142b6503206cdbf9afaf3a7f0b25f9522836bda67
                                                          • Instruction Fuzzy Hash: A191D271E012869ADB208F66C881EEE7BB5EF49710F1C4619ED22E7281D735CE50CB60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2610073882-625585964
                                                          • Opcode ID: a9a9d82901200156e352c64ac61570333f79625257ac517803884f314b831b7e
                                                          • Instruction ID: 48c5913aee36807a6d05350667f2031861cb7387defcf972d930e6cd792bbd8a
                                                          • Opcode Fuzzy Hash: a9a9d82901200156e352c64ac61570333f79625257ac517803884f314b831b7e
                                                          • Instruction Fuzzy Hash: 5591A070A00229AFDF20CFA4D844FAEBBB8EF56719F148559F915AB280D7709945CFB0
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00D1125C
                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00D11284
                                                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00D112A8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00D112D8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00D1135F
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00D113C4
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00D11430
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                          • String ID:
                                                          • API String ID: 2550207440-0
                                                          • Opcode ID: 7743ad1db1472af5220d72d91c753fa61dd34e8ceb32987256dbbc4c53c58d4e
                                                          • Instruction ID: 61cc3b178c975b0f1810828601df5a856890269b04a6192790783160ef963cb8
                                                          • Opcode Fuzzy Hash: 7743ad1db1472af5220d72d91c753fa61dd34e8ceb32987256dbbc4c53c58d4e
                                                          • Instruction Fuzzy Hash: 4291F079A00219BFDB009FA4E885BFEB7B5FF05714F144029E640E7291DB74A981CBB0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 8dadd11c20a4ff29a370f5af6ae571ed9135864eba95b60fec25091015fb7580
                                                          • Instruction ID: 904c110b82150353174f1792ce5faee77509894d97338d6b23cb66fc84ded0ca
                                                          • Opcode Fuzzy Hash: 8dadd11c20a4ff29a370f5af6ae571ed9135864eba95b60fec25091015fb7580
                                                          • Instruction Fuzzy Hash: 39913771D40219EFCB14CFA9CC84AEEBBB8FF49320F148159E615B7251D374AA46DB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00D2396B
                                                          • CharUpperBuffW.USER32(?,?), ref: 00D23A7A
                                                          • _wcslen.LIBCMT ref: 00D23A8A
                                                          • VariantClear.OLEAUT32(?), ref: 00D23C1F
                                                            • Part of subcall function 00D10CDF: VariantInit.OLEAUT32(00000000), ref: 00D10D1F
                                                            • Part of subcall function 00D10CDF: VariantCopy.OLEAUT32(?,?), ref: 00D10D28
                                                            • Part of subcall function 00D10CDF: VariantClear.OLEAUT32(?), ref: 00D10D34
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4137639002-1221869570
                                                          • Opcode ID: 735a23a94bef11261da7c92a5cd07054f945d100c18983f26fefad42a9159754
                                                          • Instruction ID: 7bb8024616c986dcb852f21f43081eb89cc81a12169ca818caad686a0a5d6e89
                                                          • Opcode Fuzzy Hash: 735a23a94bef11261da7c92a5cd07054f945d100c18983f26fefad42a9159754
                                                          • Instruction Fuzzy Hash: FC919A746083119FC704EF28D48196AB7E4FF99318F04882DF88A97351DB35EE45CBA2
                                                          APIs
                                                            • Part of subcall function 00D0000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00CFFF41,80070057,?,?,?,00D0035E), ref: 00D0002B
                                                            • Part of subcall function 00D0000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00CFFF41,80070057,?,?), ref: 00D00046
                                                            • Part of subcall function 00D0000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00CFFF41,80070057,?,?), ref: 00D00054
                                                            • Part of subcall function 00D0000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00CFFF41,80070057,?), ref: 00D00064
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00D24C51
                                                          • _wcslen.LIBCMT ref: 00D24D59
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00D24DCF
                                                          • CoTaskMemFree.OLE32(?), ref: 00D24DDA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 614568839-2785691316
                                                          • Opcode ID: a6df0f83b0bebfe360ffad3b1c5fa818f1821d3f090472101f778b28848b4bca
                                                          • Instruction ID: 3542865704b91dba9d48dcf55a7bf10d24fef9fd4ee54b5707a167e326ba837a
                                                          • Opcode Fuzzy Hash: a6df0f83b0bebfe360ffad3b1c5fa818f1821d3f090472101f778b28848b4bca
                                                          • Instruction Fuzzy Hash: EF912871D0022DAFDF14DFA4D891AEEB7B8FF08314F108169E915A7291DB349A44DFA0
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00D32183
                                                          • GetMenuItemCount.USER32(00000000), ref: 00D321B5
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00D321DD
                                                          • _wcslen.LIBCMT ref: 00D32213
                                                          • GetMenuItemID.USER32(?,?), ref: 00D3224D
                                                          • GetSubMenu.USER32(?,?), ref: 00D3225B
                                                            • Part of subcall function 00D03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D03A57
                                                            • Part of subcall function 00D03A3D: GetCurrentThreadId.KERNEL32 ref: 00D03A5E
                                                            • Part of subcall function 00D03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00D025B3), ref: 00D03A65
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00D322E3
                                                            • Part of subcall function 00D0E97B: Sleep.KERNEL32 ref: 00D0E9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                          • String ID:
                                                          • API String ID: 4196846111-0
                                                          • Opcode ID: 7c7e041496a01a78805bc04b6c3fb9c666da365059b499ac3e3bd1f27d14a4bf
                                                          • Instruction ID: cf9e971bafb4afff66f547f29ffc03aa59f328a27ab431005d9e7a43a968fca4
                                                          • Opcode Fuzzy Hash: 7c7e041496a01a78805bc04b6c3fb9c666da365059b499ac3e3bd1f27d14a4bf
                                                          • Instruction Fuzzy Hash: D0716B75E00215AFCB10EFA8C885ABEB7F5EF49310F148459E956EB351DB34EE418BA0
                                                          APIs
                                                          • GetParent.USER32(?), ref: 00D0AEF9
                                                          • GetKeyboardState.USER32(?), ref: 00D0AF0E
                                                          • SetKeyboardState.USER32(?), ref: 00D0AF6F
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00D0AF9D
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00D0AFBC
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00D0AFFD
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00D0B020
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: bdc618cb58f02074e8073e467dbff0008dd19a18ace8cfae489748e4788e55b7
                                                          • Instruction ID: 051611c333597ae963ab022007a36d9c9ac6f7e57ba3c48dccc6ee7a036ddaab
                                                          • Opcode Fuzzy Hash: bdc618cb58f02074e8073e467dbff0008dd19a18ace8cfae489748e4788e55b7
                                                          • Instruction Fuzzy Hash: D651A0A06187D63DFB3683388845BBABEA95F06314F0C858AF1DD954D2C3D8AC84D771
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 00D0AD19
                                                          • GetKeyboardState.USER32(?), ref: 00D0AD2E
                                                          • SetKeyboardState.USER32(?), ref: 00D0AD8F
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00D0ADBB
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00D0ADD8
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00D0AE17
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00D0AE38
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: a86f6748f2e2b17c6f4b6343e5b1d693fcb497dd3c725ce4b5b1f5d54b8975c4
                                                          • Instruction ID: b40375748215d7c4dd52297180cfe8af5abe3abc266ceb1454aa06f7d8342fa5
                                                          • Opcode Fuzzy Hash: a86f6748f2e2b17c6f4b6343e5b1d693fcb497dd3c725ce4b5b1f5d54b8975c4
                                                          • Instruction Fuzzy Hash: 6F51B4A16187D53DFB368338CC55BBABEA99B46300F0C8589F1DD568C2D294EC88D772
                                                          APIs
                                                          • GetConsoleCP.KERNEL32(00CE3CD6,?,?,?,?,?,?,?,?,00CD5BA3,?,?,00CE3CD6,?,?), ref: 00CD5470
                                                          • __fassign.LIBCMT ref: 00CD54EB
                                                          • __fassign.LIBCMT ref: 00CD5506
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00CE3CD6,00000005,00000000,00000000), ref: 00CD552C
                                                          • WriteFile.KERNEL32(?,00CE3CD6,00000000,00CD5BA3,00000000,?,?,?,?,?,?,?,?,?,00CD5BA3,?), ref: 00CD554B
                                                          • WriteFile.KERNEL32(?,?,00000001,00CD5BA3,00000000,?,?,?,?,?,?,?,?,?,00CD5BA3,?), ref: 00CD5584
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: d55fcc0baf4ba5aef6af2e628c71d686b2d817d78b9a041f38f26f41f4ae17a6
                                                          • Instruction ID: bf995f4741aea3841ab001b8f3f71ab1e190c23d3f6e0b8597f3a818ab954666
                                                          • Opcode Fuzzy Hash: d55fcc0baf4ba5aef6af2e628c71d686b2d817d78b9a041f38f26f41f4ae17a6
                                                          • Instruction Fuzzy Hash: EA519171A00749AFDB11CFA8E845AEEBBF9EF09300F14411BE655E7391E7309A41CB61
                                                          APIs
                                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00D36C33
                                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 00D36C4A
                                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00D36C73
                                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00D1AB79,00000000,00000000), ref: 00D36C98
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00D36CC7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MessageSendShow
                                                          • String ID: @U=u
                                                          • API String ID: 3688381893-2594219639
                                                          • Opcode ID: 2a7465e6e28db5f54778f2015787dc2fdd14efac40cc266f0b4ba78f1dbe830c
                                                          • Instruction ID: 4f9e81a9a51a62041db956ad65b480f31603c7d9619a59880927e565b69a7019
                                                          • Opcode Fuzzy Hash: 2a7465e6e28db5f54778f2015787dc2fdd14efac40cc266f0b4ba78f1dbe830c
                                                          • Instruction Fuzzy Hash: F641A135604204BFDB24CF28CC59FA9BFA5EB09350F189268F999E73A0C371ED41DA60
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 00CC2D4B
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00CC2D53
                                                          • _ValidateLocalCookies.LIBCMT ref: 00CC2DE1
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00CC2E0C
                                                          • _ValidateLocalCookies.LIBCMT ref: 00CC2E61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 1170836740-1018135373
                                                          • Opcode ID: 6196a7a2ddfd3c45995ad3f65d5edc9f12229921c7d2a9d585260e0f946be06e
                                                          • Instruction ID: 79f66322ada9b429e1e9e7c0b4e3b5642e678aca27f2b583bbbf09d4ce53abd2
                                                          • Opcode Fuzzy Hash: 6196a7a2ddfd3c45995ad3f65d5edc9f12229921c7d2a9d585260e0f946be06e
                                                          • Instruction Fuzzy Hash: DA41C134E00249ABCF10DF68C845F9EBBB5BF44324F14815DE825AB392DB31AA05CBE0
                                                          APIs
                                                            • Part of subcall function 00D2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00D2307A
                                                            • Part of subcall function 00D2304E: _wcslen.LIBCMT ref: 00D2309B
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00D21112
                                                          • WSAGetLastError.WSOCK32 ref: 00D21121
                                                          • WSAGetLastError.WSOCK32 ref: 00D211C9
                                                          • closesocket.WSOCK32(00000000), ref: 00D211F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 2675159561-0
                                                          • Opcode ID: e54b79319fa914af6f36cf4be49695bcd4a50b96375fb824c1303343fae41a51
                                                          • Instruction ID: 7f2041e0c0c34e4fdc85a7525cd301b58e45f24c53967b18f6115ebafdf8c831
                                                          • Opcode Fuzzy Hash: e54b79319fa914af6f36cf4be49695bcd4a50b96375fb824c1303343fae41a51
                                                          • Instruction Fuzzy Hash: 2B410135600324AFDB119F24D884BAAB7A9EF61328F188018FD05AB281C770EE418BB1
                                                          APIs
                                                            • Part of subcall function 00D0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00D0CF22,?), ref: 00D0DDFD
                                                            • Part of subcall function 00D0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00D0CF22,?), ref: 00D0DE16
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00D0CF45
                                                          • MoveFileW.KERNEL32(?,?), ref: 00D0CF7F
                                                          • _wcslen.LIBCMT ref: 00D0D005
                                                          • _wcslen.LIBCMT ref: 00D0D01B
                                                          • SHFileOperationW.SHELL32(?), ref: 00D0D061
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 3164238972-1173974218
                                                          • Opcode ID: 00773062b92fa80ebb53b86c7a9554a405a0c6bc9d95a62d59b622bd89b6fc27
                                                          • Instruction ID: 3292391fafd17dbc7ae04cbba0e397bb126177e415d07a0adbc62297748b3ed8
                                                          • Opcode Fuzzy Hash: 00773062b92fa80ebb53b86c7a9554a405a0c6bc9d95a62d59b622bd89b6fc27
                                                          • Instruction Fuzzy Hash: CF4158719452195FDF12EFA4D981FDE77B9EF48380F0410E6E509E7181EA34A648CB71
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D07769
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D0778F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00D07792
                                                          • SysAllocString.OLEAUT32(?), ref: 00D077B0
                                                          • SysFreeString.OLEAUT32(?), ref: 00D077B9
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00D077DE
                                                          • SysAllocString.OLEAUT32(?), ref: 00D077EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: a36f70d3103565d11fcd50478f28e469c0c8541e7ebc5d95cf44d47a8432d92b
                                                          • Instruction ID: 466131958b490df25031afe4abf74cb6d13b60df3dc570a7005340fba6590e71
                                                          • Opcode Fuzzy Hash: a36f70d3103565d11fcd50478f28e469c0c8541e7ebc5d95cf44d47a8432d92b
                                                          • Instruction Fuzzy Hash: 4421A776A04219AFDF10DFA8CC84DBB77ACEB497A4B048025F919DF291D670ED418770
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D07842
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D07868
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00D0786B
                                                          • SysAllocString.OLEAUT32 ref: 00D0788C
                                                          • SysFreeString.OLEAUT32 ref: 00D07895
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00D078AF
                                                          • SysAllocString.OLEAUT32(?), ref: 00D078BD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: dd33eed57aa29f67c4e62dfc48035d4821acb21dd6ddaaa4abe9068878e71ada
                                                          • Instruction ID: a5e75e1e281dfd405b86a10f1ea4630fc7b7a3ed3c7b6a209efa6a0a021f51e0
                                                          • Opcode Fuzzy Hash: dd33eed57aa29f67c4e62dfc48035d4821acb21dd6ddaaa4abe9068878e71ada
                                                          • Instruction Fuzzy Hash: 3E213036A08204AFDB109FA8DC89EAA77ACEB097607148125F919DB2A1D674FC41DB74
                                                          APIs
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00D35745
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00D3579D
                                                          • _wcslen.LIBCMT ref: 00D357AF
                                                          • _wcslen.LIBCMT ref: 00D357BA
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00D35816
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen
                                                          • String ID: @U=u
                                                          • API String ID: 763830540-2594219639
                                                          • Opcode ID: e3239d4b75e1f22b9cdd51a82afd326a8b77c5c6ac18ce18732d3ec85df82a6a
                                                          • Instruction ID: a5ce9f790be53cc4f6e307e72f64b673095f3129dd2491c40e01cc532b253cba
                                                          • Opcode Fuzzy Hash: e3239d4b75e1f22b9cdd51a82afd326a8b77c5c6ac18ce18732d3ec85df82a6a
                                                          • Instruction Fuzzy Hash: DC21A571904618DADB208F64EC85AED77B8FF05320F148216E919EA284D770C985CF70
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00D104F2
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00D1052E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: e9ba8831fe9ecf8e37f418d8dd1a7147feb0c4c07e1a3ecdc0b077307de23220
                                                          • Instruction ID: dabab033b33445448af623a5334049e5c00e3aa7e4d6ebc5366f8641a157ff25
                                                          • Opcode Fuzzy Hash: e9ba8831fe9ecf8e37f418d8dd1a7147feb0c4c07e1a3ecdc0b077307de23220
                                                          • Instruction Fuzzy Hash: 1B212375500305ABEB206F69E844A9A7BB5AF44764F244A19E8A1E62D0DBB0D9D0CF30
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00D105C6
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00D10601
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: f49e243773d8aaba0158590c0264c7fa92d0647c31e29f996bca43a4df9e12a8
                                                          • Instruction ID: 33bb9c96eb89b27a11dd46ed21bd7bfb1e57b9c8f72a952a5d6b1088a560390c
                                                          • Opcode Fuzzy Hash: f49e243773d8aaba0158590c0264c7fa92d0647c31e29f996bca43a4df9e12a8
                                                          • Instruction Fuzzy Hash: 64215B75500305ABDB106F69AC44ADA7BE4AF95720F244A19F8A1E72D0DBF099E0CB70
                                                          APIs
                                                            • Part of subcall function 00CA600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00CA604C
                                                            • Part of subcall function 00CA600E: GetStockObject.GDI32(00000011), ref: 00CA6060
                                                            • Part of subcall function 00CA600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00CA606A
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00D34112
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00D3411F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00D3412A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00D34139
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00D34145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: dc715b382e91c7498b8458d673ddd32566c8196221610b3b8866c6b1d330f496
                                                          • Instruction ID: 142e41f99ed52c0202fa9f44c7071c8ccb92468699675489657956a18b6ad284
                                                          • Opcode Fuzzy Hash: dc715b382e91c7498b8458d673ddd32566c8196221610b3b8866c6b1d330f496
                                                          • Instruction Fuzzy Hash: 391190B215021ABEEF118E64CC86EE77F5DEF08798F014111FA18A2150CA769C619BB4
                                                          APIs
                                                            • Part of subcall function 00CDD7A3: _free.LIBCMT ref: 00CDD7CC
                                                          • _free.LIBCMT ref: 00CDD82D
                                                            • Part of subcall function 00CD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000), ref: 00CD29DE
                                                            • Part of subcall function 00CD29C8: GetLastError.KERNEL32(00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000,00000000), ref: 00CD29F0
                                                          • _free.LIBCMT ref: 00CDD838
                                                          • _free.LIBCMT ref: 00CDD843
                                                          • _free.LIBCMT ref: 00CDD897
                                                          • _free.LIBCMT ref: 00CDD8A2
                                                          • _free.LIBCMT ref: 00CDD8AD
                                                          • _free.LIBCMT ref: 00CDD8B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction ID: 9c8f76f65d9a0d3ad1aa7e4f36195f1cf5df6eb1ebf95f62db33ad2f5850a3e5
                                                          • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction Fuzzy Hash: 4B115E71940B04AAD621BFB0CC87FCB7BDCAF10700F4108A6B39EE6292DA65B505B660
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00D0DA74
                                                          • LoadStringW.USER32(00000000), ref: 00D0DA7B
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00D0DA91
                                                          • LoadStringW.USER32(00000000), ref: 00D0DA98
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00D0DADC
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 00D0DAB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 4072794657-3128320259
                                                          • Opcode ID: 849725f934f51805183a6606367678b65249e95522c8809794ac03c1839d45db
                                                          • Instruction ID: 1818614a406e4f1595f7cd42037dca6f9c4a6f39f0af186d5d95f7df3a1f0eee
                                                          • Opcode Fuzzy Hash: 849725f934f51805183a6606367678b65249e95522c8809794ac03c1839d45db
                                                          • Instruction Fuzzy Hash: 890162F29103087FE7109BA09D89EE7726CE708301F401496B746F2181EA749E848F74
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(0115AB68,0115AB68), ref: 00D1097B
                                                          • EnterCriticalSection.KERNEL32(0115AB48,00000000), ref: 00D1098D
                                                          • TerminateThread.KERNEL32(01158950,000001F6), ref: 00D1099B
                                                          • WaitForSingleObject.KERNEL32(01158950,000003E8), ref: 00D109A9
                                                          • CloseHandle.KERNEL32(01158950), ref: 00D109B8
                                                          • InterlockedExchange.KERNEL32(0115AB68,000001F6), ref: 00D109C8
                                                          • LeaveCriticalSection.KERNEL32(0115AB48), ref: 00D109CF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: 02cac1ba8982a6de120674ef6f0d1a20738b6bf04effdb499c9a697ee6a935a6
                                                          • Instruction ID: 0e7d518ff56801c3f7a2e9c12b45c3068cd2891d3f48251b3bd11bc49de482d1
                                                          • Opcode Fuzzy Hash: 02cac1ba8982a6de120674ef6f0d1a20738b6bf04effdb499c9a697ee6a935a6
                                                          • Instruction Fuzzy Hash: 2CF01D31552602BBD7415B94EE88AD67A25BF05702F442015F101A09A1CBB494B5CFA4
                                                          APIs
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00D21DC0
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00D21DE1
                                                          • WSAGetLastError.WSOCK32 ref: 00D21DF2
                                                          • htons.WSOCK32(?,?,?,?,?), ref: 00D21EDB
                                                          • inet_ntoa.WSOCK32(?), ref: 00D21E8C
                                                            • Part of subcall function 00D039E8: _strlen.LIBCMT ref: 00D039F2
                                                            • Part of subcall function 00D23224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00D1EC0C), ref: 00D23240
                                                          • _strlen.LIBCMT ref: 00D21F35
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                          • String ID:
                                                          • API String ID: 3203458085-0
                                                          • Opcode ID: 414f901a75a39b75d3b2e639e29b40af9134d699267772c2d741be65fd90f542
                                                          • Instruction ID: d62c6a1635275b5fee8ba3d798847a8aeab2284633010e5edc1c7aa24c888f9a
                                                          • Opcode Fuzzy Hash: 414f901a75a39b75d3b2e639e29b40af9134d699267772c2d741be65fd90f542
                                                          • Instruction Fuzzy Hash: 19B1F135604311AFC324DF24D885E6A77E5AFA531CF58854CF4565B2E2CB31ED42CBA1
                                                          APIs
                                                          • __allrem.LIBCMT ref: 00CD00BA
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00CD00D6
                                                          • __allrem.LIBCMT ref: 00CD00ED
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00CD010B
                                                          • __allrem.LIBCMT ref: 00CD0122
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00CD0140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                          • Instruction ID: 20148fe604c62e86bca5e8c82d160848b61030372067dde942d11f3a6b181f22
                                                          • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                          • Instruction Fuzzy Hash: 5581D372A00706ABE724AB6DCC42B6E73E9EF41364F25412FF661D7381E770EA419790
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00CC82D9,00CC82D9,?,?,?,00CD644F,00000001,00000001,8BE85006), ref: 00CD6258
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00CD644F,00000001,00000001,8BE85006,?,?,?), ref: 00CD62DE
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00CD63D8
                                                          • __freea.LIBCMT ref: 00CD63E5
                                                            • Part of subcall function 00CD3820: RtlAllocateHeap.NTDLL(00000000,?,00D71444,?,00CBFDF5,?,?,00CAA976,00000010,00D71440,00CA13FC,?,00CA13C6,?,00CA1129), ref: 00CD3852
                                                          • __freea.LIBCMT ref: 00CD63EE
                                                          • __freea.LIBCMT ref: 00CD6413
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1414292761-0
                                                          • Opcode ID: f14ea15bf5d1829040f72d7fc49aa2179e886de527b84c3c52c68d408e1e76d3
                                                          • Instruction ID: eebf55673c44fc407f7fb25f3e1ce060ab239131f20eccb6cd7e6648c36c7b2a
                                                          • Opcode Fuzzy Hash: f14ea15bf5d1829040f72d7fc49aa2179e886de527b84c3c52c68d408e1e76d3
                                                          • Instruction Fuzzy Hash: 8D51F272600216ABDB258F64CC81EBF7BA9EF44710F15422AFF15D7291EB34DD40D660
                                                          APIs
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                            • Part of subcall function 00D2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D2B6AE,?,?), ref: 00D2C9B5
                                                            • Part of subcall function 00D2C998: _wcslen.LIBCMT ref: 00D2C9F1
                                                            • Part of subcall function 00D2C998: _wcslen.LIBCMT ref: 00D2CA68
                                                            • Part of subcall function 00D2C998: _wcslen.LIBCMT ref: 00D2CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D2BCCA
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D2BD25
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D2BD6A
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00D2BD99
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00D2BDF3
                                                          • RegCloseKey.ADVAPI32(?), ref: 00D2BDFF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                          • String ID:
                                                          • API String ID: 1120388591-0
                                                          • Opcode ID: d8688fd31d7929f1a27dc022b08f7ec9fd87c1e008e1458862f25824599e682f
                                                          • Instruction ID: b63abb8a09ed082b8ded185169e8698e929ef433cb058fc10bb69a6b24eb8845
                                                          • Opcode Fuzzy Hash: d8688fd31d7929f1a27dc022b08f7ec9fd87c1e008e1458862f25824599e682f
                                                          • Instruction Fuzzy Hash: 2381B130108241AFC714DF24C885E6ABBE5FF8531CF14895DF4968B2A2CB71ED45DBA2
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000035), ref: 00CFF7B9
                                                          • SysAllocString.OLEAUT32(00000001), ref: 00CFF860
                                                          • VariantCopy.OLEAUT32(00CFFA64,00000000), ref: 00CFF889
                                                          • VariantClear.OLEAUT32(00CFFA64), ref: 00CFF8AD
                                                          • VariantCopy.OLEAUT32(00CFFA64,00000000), ref: 00CFF8B1
                                                          • VariantClear.OLEAUT32(?), ref: 00CFF8BB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCopy$AllocInitString
                                                          • String ID:
                                                          • API String ID: 3859894641-0
                                                          • Opcode ID: 9f5eabfe764845fdda36c922396746dce5c816c228248119ae8b8fae88a3d051
                                                          • Instruction ID: 1826281ead472c9c8c427c139d568064e4cba95c74e47a7b0c5f0f2e0b53805e
                                                          • Opcode Fuzzy Hash: 9f5eabfe764845fdda36c922396746dce5c816c228248119ae8b8fae88a3d051
                                                          • Instruction Fuzzy Hash: E3510731500318BBCF64AF65D895B39B3A4EF45310F20946EEA01DF292DBB08D42E767
                                                          APIs
                                                            • Part of subcall function 00CA7620: _wcslen.LIBCMT ref: 00CA7625
                                                            • Part of subcall function 00CA6B57: _wcslen.LIBCMT ref: 00CA6B6A
                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00D194E5
                                                          • _wcslen.LIBCMT ref: 00D19506
                                                          • _wcslen.LIBCMT ref: 00D1952D
                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00D19585
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$FileName$OpenSave
                                                          • String ID: X
                                                          • API String ID: 83654149-3081909835
                                                          • Opcode ID: a246f8fa4d2ab92ae75c80e0d5c0eec7e2e0557947e78632bc355f9ccf2d73d6
                                                          • Instruction ID: b7cdeeaf50010c859db31902b72d9a470d6e88c0b2dc3ce40e948270ef60e132
                                                          • Opcode Fuzzy Hash: a246f8fa4d2ab92ae75c80e0d5c0eec7e2e0557947e78632bc355f9ccf2d73d6
                                                          • Instruction Fuzzy Hash: A8E1C2315083419FD714DF24D8A1AAAB7E5FF85314F08896CF8999B2A2DB30DD45CBA2
                                                          APIs
                                                            • Part of subcall function 00CB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CB9BB2
                                                          • BeginPaint.USER32(?,?,?), ref: 00CB9241
                                                          • GetWindowRect.USER32(?,?), ref: 00CB92A5
                                                          • ScreenToClient.USER32(?,?), ref: 00CB92C2
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00CB92D3
                                                          • EndPaint.USER32(?,?,?,?,?), ref: 00CB9321
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00CF71EA
                                                            • Part of subcall function 00CB9339: BeginPath.GDI32(00000000), ref: 00CB9357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                          • String ID:
                                                          • API String ID: 3050599898-0
                                                          • Opcode ID: c688d54c957739f79b4d813fe666915a9abeca04e0561aabbe9b8792d84b92c6
                                                          • Instruction ID: dc52275d7ca2977ae85af3eb07a3c1a4296b3aa8f9ca02028471a2e1a515d24a
                                                          • Opcode Fuzzy Hash: c688d54c957739f79b4d813fe666915a9abeca04e0561aabbe9b8792d84b92c6
                                                          • Instruction Fuzzy Hash: BF418E75104300AFD721DF29CC85FBA7BB8EB45320F144229FA69D72B2D7319945DB62
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00D1080C
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00D10847
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00D10863
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00D108DC
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00D108F3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00D10921
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                          • String ID:
                                                          • API String ID: 3368777196-0
                                                          • Opcode ID: 782e01857b1c3dcbfb996035327ed6dfbe1a7562a5a3fe05a317113bed83516b
                                                          • Instruction ID: d2103dd28191303bdb56847e7600b3f68f609d41326df0b6bf2fb64e8d0a5f16
                                                          • Opcode Fuzzy Hash: 782e01857b1c3dcbfb996035327ed6dfbe1a7562a5a3fe05a317113bed83516b
                                                          • Instruction Fuzzy Hash: CB414C71900205EBDF14AF64DC85AAA7BB9FF04310F1440A9ED04EA297DB70DEA5DBB4
                                                          APIs
                                                            • Part of subcall function 00CA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CA3A97,?,?,00CA2E7F,?,?,?,00000000), ref: 00CA3AC2
                                                          • _wcslen.LIBCMT ref: 00D1587B
                                                          • CoInitialize.OLE32(00000000), ref: 00D15995
                                                          • CoCreateInstance.OLE32(00D3FCF8,00000000,00000001,00D3FB68,?), ref: 00D159AE
                                                          • CoUninitialize.OLE32 ref: 00D159CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 3172280962-24824748
                                                          • Opcode ID: 15254985c4c0f5866735a145ec6331acce191919a5b9e137788e7080f73f7a57
                                                          • Instruction ID: 076d7c53523feeda9c2d3f293344d187d416ab1b93f8021b7603dec52f005cb8
                                                          • Opcode Fuzzy Hash: 15254985c4c0f5866735a145ec6331acce191919a5b9e137788e7080f73f7a57
                                                          • Instruction Fuzzy Hash: 1AD15370608701EFC704DF14E480A6ABBE1FF89714F148959F88A9B361DB35EC85CBA2
                                                          APIs
                                                            • Part of subcall function 00D00FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00D00FCA
                                                            • Part of subcall function 00D00FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00D00FD6
                                                            • Part of subcall function 00D00FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00D00FE5
                                                            • Part of subcall function 00D00FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00D00FEC
                                                            • Part of subcall function 00D00FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00D01002
                                                          • GetLengthSid.ADVAPI32(?,00000000,00D01335), ref: 00D017AE
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00D017BA
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00D017C1
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00D017DA
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,00D01335), ref: 00D017EE
                                                          • HeapFree.KERNEL32(00000000), ref: 00D017F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: a742ce3875973dea7758351765c9ca25ffa9c6ff28de0351bffdb39684190854
                                                          • Instruction ID: 2a291171ac8d1fc9694d885c7ee68287bde9428875b6937df7560ee1425c6373
                                                          • Opcode Fuzzy Hash: a742ce3875973dea7758351765c9ca25ffa9c6ff28de0351bffdb39684190854
                                                          • Instruction Fuzzy Hash: 33119736610305EBDB149FA4CC49BAE7BA9FB96355F144018F489E7290C736A944DB70
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00D014FF
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00D01506
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00D01515
                                                          • CloseHandle.KERNEL32(00000004), ref: 00D01520
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00D0154F
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00D01563
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: b12637f4755c6b2e32c6af51da7ab4220d3fea1eb1921abc1454fc15db9ab110
                                                          • Instruction ID: dc01bbda9795ac6e22d40afdf5c45d451fe2dee73d10ea0af39174eccd50f352
                                                          • Opcode Fuzzy Hash: b12637f4755c6b2e32c6af51da7ab4220d3fea1eb1921abc1454fc15db9ab110
                                                          • Instruction Fuzzy Hash: A4112676500249ABDF118FA8DD49BDE7BA9FF48748F084029FA09A21A0C375CE64DB70
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00CC3379,00CC2FE5), ref: 00CC3390
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00CC339E
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00CC33B7
                                                          • SetLastError.KERNEL32(00000000,?,00CC3379,00CC2FE5), ref: 00CC3409
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: 6663b7b0529ad61bbeca1c8dc2e19a88bbc3912442083f953586b576b00be311
                                                          • Instruction ID: 774cd82d96fafb0d16c17ed50716a410c45269ff50fee2ca6633811507e8cbf8
                                                          • Opcode Fuzzy Hash: 6663b7b0529ad61bbeca1c8dc2e19a88bbc3912442083f953586b576b00be311
                                                          • Instruction Fuzzy Hash: 2301243261C3D1BEA7286774FC95F6A2A94EB0537A320822EF520C13F0EF554E0362A4
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00CD5686,00CE3CD6,?,00000000,?,00CD5B6A,?,?,?,?,?,00CCE6D1,?,00D68A48), ref: 00CD2D78
                                                          • _free.LIBCMT ref: 00CD2DAB
                                                          • _free.LIBCMT ref: 00CD2DD3
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,00CCE6D1,?,00D68A48,00000010,00CA4F4A,?,?,00000000,00CE3CD6), ref: 00CD2DE0
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,00CCE6D1,?,00D68A48,00000010,00CA4F4A,?,?,00000000,00CE3CD6), ref: 00CD2DEC
                                                          • _abort.LIBCMT ref: 00CD2DF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free$_abort
                                                          • String ID:
                                                          • API String ID: 3160817290-0
                                                          • Opcode ID: e981df1a4c95a2e72e38a1b2853886ba10e79255c175a3a363c3b3b24a197a37
                                                          • Instruction ID: 27e093bb8263a0abcdb923a3e6caebe7ad2d8df6bf28789e9330835e843e2e99
                                                          • Opcode Fuzzy Hash: e981df1a4c95a2e72e38a1b2853886ba10e79255c175a3a363c3b3b24a197a37
                                                          • Instruction Fuzzy Hash: 1BF0CD315047006BC2123735BC06E1B25576FE27A1F244417F774D23D2EF64C901B271
                                                          APIs
                                                            • Part of subcall function 00CB9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00CB9693
                                                            • Part of subcall function 00CB9639: SelectObject.GDI32(?,00000000), ref: 00CB96A2
                                                            • Part of subcall function 00CB9639: BeginPath.GDI32(?), ref: 00CB96B9
                                                            • Part of subcall function 00CB9639: SelectObject.GDI32(?,00000000), ref: 00CB96E2
                                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00D38A4E
                                                          • LineTo.GDI32(?,00000003,00000000), ref: 00D38A62
                                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00D38A70
                                                          • LineTo.GDI32(?,00000000,00000003), ref: 00D38A80
                                                          • EndPath.GDI32(?), ref: 00D38A90
                                                          • StrokePath.GDI32(?), ref: 00D38AA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: 1d6162eb7ff96e4c8ac81dafe0294b5d134d1f46df6c4e0ce4938cb77eabc1b5
                                                          • Instruction ID: 793be9a8e735f3a1ba004a2a5f1b866b28535fcec2c5ebc7046dc4fc2fab55f2
                                                          • Opcode Fuzzy Hash: 1d6162eb7ff96e4c8ac81dafe0294b5d134d1f46df6c4e0ce4938cb77eabc1b5
                                                          • Instruction Fuzzy Hash: 5611CC7600024DFFDB119F94DC48E9A7F6DEB04394F048011FA19992A1D7719D55DF70
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00D05218
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00D05229
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D05230
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00D05238
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00D0524F
                                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00D05261
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: 60c1ac9d04359ac702d24d741653848bd5f51a3ac7cbc63ebc831c7cf5da0f08
                                                          • Instruction ID: 4d0d6ca3ef160f4285d45088554748c0c5bee8eaff8088e1ab50000fe24df0a9
                                                          • Opcode Fuzzy Hash: 60c1ac9d04359ac702d24d741653848bd5f51a3ac7cbc63ebc831c7cf5da0f08
                                                          • Instruction Fuzzy Hash: 6B014F75A01718BBEB109BB59C49B5EBFB8EF48751F044065FA04E7391D6709800CFA0
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00CA1BF4
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00CA1BFC
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00CA1C07
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00CA1C12
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00CA1C1A
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CA1C22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 509188e85aa1e674254545e1307ba7aa38d97b23f57ff0b9f8df1e9b2ad106b3
                                                          • Instruction ID: c60a1872bd21924f459413a8547c5217f314be2134e2c22986853fb7c8f97dc6
                                                          • Opcode Fuzzy Hash: 509188e85aa1e674254545e1307ba7aa38d97b23f57ff0b9f8df1e9b2ad106b3
                                                          • Instruction Fuzzy Hash: A9016CB09027597DE3008F5A8C85B52FFA8FF19354F00411B915C47A41C7F5A864CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00D0EB30
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00D0EB46
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00D0EB55
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D0EB64
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D0EB6E
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D0EB75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: 7b877070ca9ba3bf0df01f026811fe72217610dd405e608274eb7b5bdc0268d3
                                                          • Instruction ID: 51502012c48213b98661105c10e7e267d72a3b65d8485b45517608d5b4fe4122
                                                          • Opcode Fuzzy Hash: 7b877070ca9ba3bf0df01f026811fe72217610dd405e608274eb7b5bdc0268d3
                                                          • Instruction Fuzzy Hash: D1F03A72250258BBE7215B629C0EEEF3A7CEFCAB11F005158F601E12A1D7A05A01D7B5
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00D0187F
                                                          • UnloadUserProfile.USERENV(?,?), ref: 00D0188B
                                                          • CloseHandle.KERNEL32(?), ref: 00D01894
                                                          • CloseHandle.KERNEL32(?), ref: 00D0189C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00D018A5
                                                          • HeapFree.KERNEL32(00000000), ref: 00D018AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: ca9537a4e9af77d9ad471cef2e416d76d2ef22ecfb78e22a75f40258ee700e9d
                                                          • Instruction ID: 2a81f2267b3e70c2af33791e4fa24d5fd91ec7df70d6543333ea38adf6d45be4
                                                          • Opcode Fuzzy Hash: ca9537a4e9af77d9ad471cef2e416d76d2ef22ecfb78e22a75f40258ee700e9d
                                                          • Instruction Fuzzy Hash: C7E0E576114301BBDB015FA1ED0C90ABF39FF59B22B109220F225E1270CB329430EF60
                                                          APIs
                                                            • Part of subcall function 00CA7620: _wcslen.LIBCMT ref: 00CA7625
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D0C6EE
                                                          • _wcslen.LIBCMT ref: 00D0C735
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D0C79C
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00D0C7CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info_wcslen$Default
                                                          • String ID: 0
                                                          • API String ID: 1227352736-4108050209
                                                          • Opcode ID: 705348194b5aba2a0afa8b378f67513d6fdd4905648402e81e6c4018b57aaf98
                                                          • Instruction ID: bff68fd031d1fe04459d976a9827f0499d9a65bf6a32f1e79d4a222c063f9158
                                                          • Opcode Fuzzy Hash: 705348194b5aba2a0afa8b378f67513d6fdd4905648402e81e6c4018b57aaf98
                                                          • Instruction Fuzzy Hash: B751B1716243019BD7259F28C885B6B77E8AF85314F082B2DF999D32E0EB70D9059B72
                                                          APIs
                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 00D2AEA3
                                                            • Part of subcall function 00CA7620: _wcslen.LIBCMT ref: 00CA7625
                                                          • GetProcessId.KERNEL32(00000000), ref: 00D2AF38
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D2AF67
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                                          • String ID: <$@
                                                          • API String ID: 146682121-1426351568
                                                          • Opcode ID: 59d2795e3fb5802d1c2d0e1811fe932c35f06a2713b99bacef74cf43582fac31
                                                          • Instruction ID: c7973620461d8982e14f838728bee23185a309ccd30c5bc379908bc55343f5e4
                                                          • Opcode Fuzzy Hash: 59d2795e3fb5802d1c2d0e1811fe932c35f06a2713b99bacef74cf43582fac31
                                                          • Instruction Fuzzy Hash: 06718C71A00629DFCB14EF58D484A9EBBF0FF09318F058499E816AB362D774ED45CBA1
                                                          APIs
                                                          • GetWindowRect.USER32(0116EBD0,?), ref: 00D362E2
                                                          • ScreenToClient.USER32(?,?), ref: 00D36315
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00D36382
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID: @U=u
                                                          • API String ID: 3880355969-2594219639
                                                          • Opcode ID: 12bff20eaf873191819b6db5503ea6cfcba56094cb309f60f02564744cc6b05c
                                                          • Instruction ID: a337ce54117ba896861958941391c390a8db2e844435103407a3909a0b913b42
                                                          • Opcode Fuzzy Hash: 12bff20eaf873191819b6db5503ea6cfcba56094cb309f60f02564744cc6b05c
                                                          • Instruction Fuzzy Hash: E0510A75A00209EFDB10DF68D8819AE7BB5EB45360F188259F965DB2A0D730ED81CB60
                                                          APIs
                                                            • Part of subcall function 00D0B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D021D0,?,?,00000034,00000800,?,00000034), ref: 00D0B42D
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00D02760
                                                            • Part of subcall function 00D0B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00D0B3F8
                                                            • Part of subcall function 00D0B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00D0B355
                                                            • Part of subcall function 00D0B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00D02194,00000034,?,?,00001004,00000000,00000000), ref: 00D0B365
                                                            • Part of subcall function 00D0B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00D02194,00000034,?,?,00001004,00000000,00000000), ref: 00D0B37B
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00D027CD
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00D0281A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @$@U=u
                                                          • API String ID: 4150878124-826235744
                                                          • Opcode ID: d05331d6d84fbf2828d69e3ecbbbad90db1bca363f615f2fb35bc90643789fb0
                                                          • Instruction ID: 3d3cd7f8284dbcbd068e7c523539ec90ffeffa25299d3d829cda246412052f4d
                                                          • Opcode Fuzzy Hash: d05331d6d84fbf2828d69e3ecbbbad90db1bca363f615f2fb35bc90643789fb0
                                                          • Instruction Fuzzy Hash: EF412B76901218AFDB10DFA4CD86BEEBBB8EF09310F148055FA59B7191DB706E45CBA0
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00D07206
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00D0723C
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00D0724D
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00D072CF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: b271808846749c84d469998942c1ed74800927cb24c58f25a5fb2fba83cc61bf
                                                          • Instruction ID: e3768a7272bbf0953397218f91b29fdbc5a9f3c5a37acd2e063531aa4728f037
                                                          • Opcode Fuzzy Hash: b271808846749c84d469998942c1ed74800927cb24c58f25a5fb2fba83cc61bf
                                                          • Instruction Fuzzy Hash: 73413BB1E04204AFDB15CF64C884B9A7BA9EF44310F1580A9BD099F28AD7B1ED45DBB4
                                                          APIs
                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00D35352
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D35375
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00D35382
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00D353A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$InvalidateMessageRectSend
                                                          • String ID: @U=u
                                                          • API String ID: 3340791633-2594219639
                                                          • Opcode ID: adf680affbd72d8f2609d049b067b95c5970c714d0d197ec708469a657bfab7d
                                                          • Instruction ID: a18376eca604157c9ef1266e70a5341f715a6e73a611bd80de3b2be0d91d800b
                                                          • Opcode Fuzzy Hash: adf680affbd72d8f2609d049b067b95c5970c714d0d197ec708469a657bfab7d
                                                          • Instruction Fuzzy Hash: CC31C334A95A08EFEB309F54EC06BE83765EB053D0F5C4101FA51962E5C7B1AD80EB72
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                          • API String ID: 176396367-4004644295
                                                          • Opcode ID: 9c9ac0b1a62a7c82a75972f076140fd7bde4607b7c74461fbb970162cc2e73e3
                                                          • Instruction ID: 78c9e5ad12020d31fd7e72d4f426a9393a2e32fb31fdbcb6d79b8904cc3c3c0d
                                                          • Opcode Fuzzy Hash: 9c9ac0b1a62a7c82a75972f076140fd7bde4607b7c74461fbb970162cc2e73e3
                                                          • Instruction Fuzzy Hash: D4310433A2017E4BCB20DF6CE8515BE33919BB179CB0D5129E855AB344FA71CE8493B0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00D32F8D
                                                          • LoadLibraryW.KERNEL32(?), ref: 00D32F94
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00D32FA9
                                                          • DestroyWindow.USER32(?), ref: 00D32FB1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                                          • String ID: SysAnimate32
                                                          • API String ID: 3529120543-1011021900
                                                          • Opcode ID: 97486f1dae90cc57ee38fd726fcbf68587161be5dd173d7dd95c74e4d98f3954
                                                          • Instruction ID: f374eaba48fe0de8807ed7c3de9b604d7a87f8e0b0c896fed16a0dc6d639c48e
                                                          • Opcode Fuzzy Hash: 97486f1dae90cc57ee38fd726fcbf68587161be5dd173d7dd95c74e4d98f3954
                                                          • Instruction Fuzzy Hash: DF21AC72A04209ABEB104F66DC81EBB77B9EF59368F140228FA50E22A0D771DC919770
                                                          APIs
                                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 00D356BB
                                                          • _wcslen.LIBCMT ref: 00D356CD
                                                          • _wcslen.LIBCMT ref: 00D356D8
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00D35816
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend_wcslen
                                                          • String ID: @U=u
                                                          • API String ID: 455545452-2594219639
                                                          • Opcode ID: 8e3cee7695ab8403a1fe5e4efdf58eded2e4064fb7fc0dc11e9c32414fa13e97
                                                          • Instruction ID: 1de56c36121b1cc5f402d2ae7ed4cb29e21f511457c8d8dfc8adde96e67541ca
                                                          • Opcode Fuzzy Hash: 8e3cee7695ab8403a1fe5e4efdf58eded2e4064fb7fc0dc11e9c32414fa13e97
                                                          • Instruction Fuzzy Hash: A9110075A00618A6DB20DF65EC82AEE37ACEF01760F14802AF905D6085EB70CA80CF70
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00CA604C
                                                          • GetStockObject.GDI32(00000011), ref: 00CA6060
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00CA606A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID: @U=u
                                                          • API String ID: 3970641297-2594219639
                                                          • Opcode ID: db2fc674cf4ab2decdb47301fdf39f11bb32fe5736b91ff9ae8e3a64c6d74b89
                                                          • Instruction ID: 6fc763c7b98d5a62b3269d98f9b68ede8520827371c0c5d409bc46cf1a7a55fb
                                                          • Opcode Fuzzy Hash: db2fc674cf4ab2decdb47301fdf39f11bb32fe5736b91ff9ae8e3a64c6d74b89
                                                          • Instruction Fuzzy Hash: D611617250164ABFEF124FA49C45EEABF69EF09398F050215FA1492110D7329DA0EBA4
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00CC4D1E,00CD28E9,?,00CC4CBE,00CD28E9,00D688B8,0000000C,00CC4E15,00CD28E9,00000002), ref: 00CC4D8D
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00CC4DA0
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00CC4D1E,00CD28E9,?,00CC4CBE,00CD28E9,00D688B8,0000000C,00CC4E15,00CD28E9,00000002,00000000), ref: 00CC4DC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: a37f1785eae4daf5f2553776f6fa061c3c51939c9555b8ab710e5ad873fd9cfe
                                                          • Instruction ID: dbaa1617779cb4faf79125ededa5c62f5ea4de1e89efe2590f9c3a4ee97928b6
                                                          • Opcode Fuzzy Hash: a37f1785eae4daf5f2553776f6fa061c3c51939c9555b8ab710e5ad873fd9cfe
                                                          • Instruction Fuzzy Hash: EFF04F35A50308BBDB159F90DC49FADBFB5EF44751F0041A8F906E2260CB705A44DBE1
                                                          APIs
                                                          • LoadLibraryA.KERNEL32 ref: 00CFD3AD
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00CFD3BF
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00CFD3E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: GetSystemWow64DirectoryW$X64
                                                          • API String ID: 145871493-2590602151
                                                          • Opcode ID: 4aba517fd10991d77468d0740e9f5dc867178d65095abb1e1d09bfdfae53f129
                                                          • Instruction ID: 9996c3edc682493d97e48cd21357732e97043378d829cc6d477771f627d050b8
                                                          • Opcode Fuzzy Hash: 4aba517fd10991d77468d0740e9f5dc867178d65095abb1e1d09bfdfae53f129
                                                          • Instruction Fuzzy Hash: 68F020358067289BE7F11B118C489793221AF00B01F519148EB13F2224DB20CE48ABE3
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00CA4EDD,?,00D71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CA4E9C
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00CA4EAE
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00CA4EDD,?,00D71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CA4EC0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-3689287502
                                                          • Opcode ID: dabe7110163c6e9b30b1beac8e410e7ed59be267503943751a16c5737c4f640c
                                                          • Instruction ID: 6016597591e8e7fb7522552a87e7828c9e8282217169146ed9b1480157a6974b
                                                          • Opcode Fuzzy Hash: dabe7110163c6e9b30b1beac8e410e7ed59be267503943751a16c5737c4f640c
                                                          • Instruction Fuzzy Hash: 9BE08C36A127235B92221B25AC18A6BA658AFC2B66B090115FC01F2240DBA0CE0692F1
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00CE3CDE,?,00D71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CA4E62
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00CA4E74
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00CE3CDE,?,00D71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00CA4E87
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-1355242751
                                                          • Opcode ID: d78241873623b0ec02900c74663c8e7f46fa58bdb99ba3a1f09053497a4e1ebe
                                                          • Instruction ID: c7007111b1ffd2ad23836e76d64fd140578782d830959a9074938dee15e984d5
                                                          • Opcode Fuzzy Hash: d78241873623b0ec02900c74663c8e7f46fa58bdb99ba3a1f09053497a4e1ebe
                                                          • Instruction Fuzzy Hash: 46D012365127225B56261B257C1CD8BAA58AFC6B553051515B915F2254CFA0CE0196F0
                                                          APIs
                                                          • GetCurrentProcessId.KERNEL32 ref: 00D2A427
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00D2A435
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00D2A468
                                                          • CloseHandle.KERNEL32(?), ref: 00D2A63D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                                          • String ID:
                                                          • API String ID: 3488606520-0
                                                          • Opcode ID: 8e2fef2ee6efe6a353f316522075a7aae3e24c033a97c813af09d7d22aa114f2
                                                          • Instruction ID: 9e7685ceb8ab68eccb4a0d4a92dd426865cf4292ed0d70dc9aaeb8a291f50ccf
                                                          • Opcode Fuzzy Hash: 8e2fef2ee6efe6a353f316522075a7aae3e24c033a97c813af09d7d22aa114f2
                                                          • Instruction Fuzzy Hash: F8A1BF716047019FD720DF28D882F2AB7E1EF94718F18881DF59A9B392D7B0EC418B92
                                                          APIs
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00D43700), ref: 00CDBB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00D7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00CDBC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00D71270,000000FF,?,0000003F,00000000,?), ref: 00CDBC36
                                                          • _free.LIBCMT ref: 00CDBB7F
                                                            • Part of subcall function 00CD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000), ref: 00CD29DE
                                                            • Part of subcall function 00CD29C8: GetLastError.KERNEL32(00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000,00000000), ref: 00CD29F0
                                                          • _free.LIBCMT ref: 00CDBD4B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                          • String ID:
                                                          • API String ID: 1286116820-0
                                                          • Opcode ID: 45c1b52a0b28d54db202e8f09f55bde5f7189dcb4bc15c4ceccfb2d55003895c
                                                          • Instruction ID: 90fc5ad709cf8d55de2938bf1b0779f234a922c24b2692997c740210ed137b3a
                                                          • Opcode Fuzzy Hash: 45c1b52a0b28d54db202e8f09f55bde5f7189dcb4bc15c4ceccfb2d55003895c
                                                          • Instruction Fuzzy Hash: 5D51A775900309EFCB10EF69DC429AEB7B8FF44350B11426BE664D73A1EB709E41AB64
                                                          APIs
                                                            • Part of subcall function 00D0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00D0CF22,?), ref: 00D0DDFD
                                                            • Part of subcall function 00D0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00D0CF22,?), ref: 00D0DE16
                                                            • Part of subcall function 00D0E199: GetFileAttributesW.KERNEL32(?,00D0CF95), ref: 00D0E19A
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00D0E473
                                                          • MoveFileW.KERNEL32(?,?), ref: 00D0E4AC
                                                          • _wcslen.LIBCMT ref: 00D0E5EB
                                                          • _wcslen.LIBCMT ref: 00D0E603
                                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00D0E650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                          • String ID:
                                                          • API String ID: 3183298772-0
                                                          • Opcode ID: 656c895f9f6809cc955469bf06e6dda76a4515f23195e85aef980d2fd3648869
                                                          • Instruction ID: 2f3231109560774d10c89bc8c170eb8b82a71720f86778278358ebb500bc9170
                                                          • Opcode Fuzzy Hash: 656c895f9f6809cc955469bf06e6dda76a4515f23195e85aef980d2fd3648869
                                                          • Instruction Fuzzy Hash: 0E515DB24083459BC724EB90D885ADBB3ECEF85344F04492EE589D3191EE75E6888776
                                                          APIs
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                            • Part of subcall function 00D2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D2B6AE,?,?), ref: 00D2C9B5
                                                            • Part of subcall function 00D2C998: _wcslen.LIBCMT ref: 00D2C9F1
                                                            • Part of subcall function 00D2C998: _wcslen.LIBCMT ref: 00D2CA68
                                                            • Part of subcall function 00D2C998: _wcslen.LIBCMT ref: 00D2CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D2BAA5
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D2BB00
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00D2BB63
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 00D2BBA6
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00D2BBB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 826366716-0
                                                          • Opcode ID: b1064e8c3d8dd9f3aa3a74b75600410f28df7e73e97331046d425114ed939e4a
                                                          • Instruction ID: 6860fc62510c74813bd03d92603b2e4941a5b0ee43f0bab088ae384ff9c7354d
                                                          • Opcode Fuzzy Hash: b1064e8c3d8dd9f3aa3a74b75600410f28df7e73e97331046d425114ed939e4a
                                                          • Instruction Fuzzy Hash: C761C131208241AFC314DF24D491E2ABBE5FF8531CF18859DF4998B2A2CB71ED45CBA2
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00D08BCD
                                                          • VariantClear.OLEAUT32 ref: 00D08C3E
                                                          • VariantClear.OLEAUT32 ref: 00D08C9D
                                                          • VariantClear.OLEAUT32(?), ref: 00D08D10
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00D08D3B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType
                                                          • String ID:
                                                          • API String ID: 4136290138-0
                                                          • Opcode ID: 4365a203392ebd9bcdeeec561f59c061453d597604926dc0cb683991783aa5b3
                                                          • Instruction ID: b594b44ee96fd3673e31e7b2fcd025eb534d718c677cf23cf67d17815a06722f
                                                          • Opcode Fuzzy Hash: 4365a203392ebd9bcdeeec561f59c061453d597604926dc0cb683991783aa5b3
                                                          • Instruction Fuzzy Hash: 18517BB5A10219EFCB10CF68C884AAAB7F8FF89310B158559F949DB350E730E911CFA0
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00D18BAE
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00D18BDA
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00D18C32
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00D18C57
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00D18C5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String
                                                          • String ID:
                                                          • API String ID: 2832842796-0
                                                          • Opcode ID: c32651cc18b6812f263bd39e730d3e5e1d89434110712a9e36cefc8e3542c8f0
                                                          • Instruction ID: d5ac5d38e2ca0e0dc86a5d26f2891d3f2620a17dd400e4d01a54d80745da5391
                                                          • Opcode Fuzzy Hash: c32651cc18b6812f263bd39e730d3e5e1d89434110712a9e36cefc8e3542c8f0
                                                          • Instruction Fuzzy Hash: C5513D35A00215EFCB05DF64C881AAEBBF5FF49314F088458E849AB362DB35ED51DBA0
                                                          APIs
                                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00D28F40
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00D28FD0
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00D28FEC
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00D29032
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00D29052
                                                            • Part of subcall function 00CBF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00D11043,?,75B8E610), ref: 00CBF6E6
                                                            • Part of subcall function 00CBF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00CFFA64,00000000,00000000,?,?,00D11043,?,75B8E610,?,00CFFA64), ref: 00CBF70D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                          • String ID:
                                                          • API String ID: 666041331-0
                                                          • Opcode ID: 0af289bc0413c090767f1c9778ca2ff79e760a84c9eba991badf50da6f33f42b
                                                          • Instruction ID: f52c133e1ea2768cca703656777bd3e0413012951488eaec977016bbf38c0873
                                                          • Opcode Fuzzy Hash: 0af289bc0413c090767f1c9778ca2ff79e760a84c9eba991badf50da6f33f42b
                                                          • Instruction Fuzzy Hash: A8515E35601215DFC711DF54C5958ADBBF1FF59318F088099E805AB362DB31ED85DBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 633b5991d2840a0a663d5e598aeee0a45e444b72e728eea3f8ef59689c430909
                                                          • Instruction ID: 5cb37b8d6af40b88971b676091959f3577f62561bc258645c896fc444b9b5ac7
                                                          • Opcode Fuzzy Hash: 633b5991d2840a0a663d5e598aeee0a45e444b72e728eea3f8ef59689c430909
                                                          • Instruction Fuzzy Hash: 6441C532A00200AFCB24DF78C981A6DB7F5EF99314F1585AAE615EB395D731EE01DB90
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00CB9141
                                                          • ScreenToClient.USER32(00000000,?), ref: 00CB915E
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00CB9183
                                                          • GetAsyncKeyState.USER32(00000002), ref: 00CB919D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 5d0ab9c641882ccdcb0ed90c0e4fe432b4055e9b85a4ec7df3c3b07632ff549e
                                                          • Instruction ID: 6e4b7998e2bfbff69254cfc82cbfb9ff9a1458e98c9e4647f4f3ab002884c378
                                                          • Opcode Fuzzy Hash: 5d0ab9c641882ccdcb0ed90c0e4fe432b4055e9b85a4ec7df3c3b07632ff549e
                                                          • Instruction Fuzzy Hash: F9414F71A0861AFBDF159F68C848BFEB774FF05320F208319E529A7290C7346A54DBA1
                                                          APIs
                                                          • GetInputState.USER32 ref: 00D138CB
                                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00D13922
                                                          • TranslateMessage.USER32(?), ref: 00D1394B
                                                          • DispatchMessageW.USER32(?), ref: 00D13955
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D13966
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                          • String ID:
                                                          • API String ID: 2256411358-0
                                                          • Opcode ID: cd7dea54140cb41aa2f96caa1dad567bb5877a196bda01dfe46c7f79cc26232a
                                                          • Instruction ID: 5c1d365670e9578d120a92dd9ba0c16dbe322310d69df4d022365c6aa24c92a7
                                                          • Opcode Fuzzy Hash: cd7dea54140cb41aa2f96caa1dad567bb5877a196bda01dfe46c7f79cc26232a
                                                          • Instruction Fuzzy Hash: 15318874504341BEEB35CB38B849BF63BA4EB05304F080669E4A6D6290EBB496C5CF71
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 00D1CF38
                                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 00D1CF6F
                                                          • GetLastError.KERNEL32(?,00000000,?,?,?,00D1C21E,00000000), ref: 00D1CFB4
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00D1C21E,00000000), ref: 00D1CFC8
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00D1C21E,00000000), ref: 00D1CFF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                          • String ID:
                                                          • API String ID: 3191363074-0
                                                          • Opcode ID: f91f300504e94e4d263b5736f8ef3a5bb58e7b5f11df5bb6501f6106597a1a45
                                                          • Instruction ID: fe6017d6206f9cb5125fd065b162e56bb0e3e9c9b41caf936106685594351893
                                                          • Opcode Fuzzy Hash: f91f300504e94e4d263b5736f8ef3a5bb58e7b5f11df5bb6501f6106597a1a45
                                                          • Instruction Fuzzy Hash: 29315A71555305BFDB20DFA5E884AABBBF9EF14310B14542EF516E2240EB30EE829B70
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00D01915
                                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 00D019C1
                                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 00D019C9
                                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 00D019DA
                                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00D019E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: f8ec66b58def82654fc39190000cc120b195f5cc7e8e2c4f52df6109fd7b351e
                                                          • Instruction ID: 68b18c8fac297497bd7bca5efca5927f30533d8f01b4497f4c65276cc4d32148
                                                          • Opcode Fuzzy Hash: f8ec66b58def82654fc39190000cc120b195f5cc7e8e2c4f52df6109fd7b351e
                                                          • Instruction Fuzzy Hash: 88319C75A00219EFCB00CFA8DD99BDE3BB5EB05315F144229F965E72D1C7709944DBA0
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00D20951
                                                          • GetForegroundWindow.USER32 ref: 00D20968
                                                          • GetDC.USER32(00000000), ref: 00D209A4
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 00D209B0
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 00D209E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: 652bcbec2064d793c62cf7c763af27df9656ebd5132a0c99df8fc766d58fdbe4
                                                          • Instruction ID: 50840dea883d88d993d5ef81c64ca6c4910505f1dc59afccf71074be5d4f9e08
                                                          • Opcode Fuzzy Hash: 652bcbec2064d793c62cf7c763af27df9656ebd5132a0c99df8fc766d58fdbe4
                                                          • Instruction Fuzzy Hash: 83216F35A00214AFD704EF69D885AAEBBE9EF45704F048068F84AE7762CB30EC44DB60
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 00CDCDC6
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00CDCDE9
                                                            • Part of subcall function 00CD3820: RtlAllocateHeap.NTDLL(00000000,?,00D71444,?,00CBFDF5,?,?,00CAA976,00000010,00D71440,00CA13FC,?,00CA13C6,?,00CA1129), ref: 00CD3852
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00CDCE0F
                                                          • _free.LIBCMT ref: 00CDCE22
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00CDCE31
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: f294e641565c33c54303c021ce63ebab68dc519727d3574dc7ebcc25d8475433
                                                          • Instruction ID: f4ccee8bfd43d1fde4375063ed2fc6f1b5539412da56ecc7a455988c3a57b4ca
                                                          • Opcode Fuzzy Hash: f294e641565c33c54303c021ce63ebab68dc519727d3574dc7ebcc25d8475433
                                                          • Instruction Fuzzy Hash: 640184B26013167F272116BB6CC8D7BBA6DDEC6BA1315012BFA15D7701EA618E01E2B0
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00CB9693
                                                          • SelectObject.GDI32(?,00000000), ref: 00CB96A2
                                                          • BeginPath.GDI32(?), ref: 00CB96B9
                                                          • SelectObject.GDI32(?,00000000), ref: 00CB96E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 73f19f14f871451f53f431c5b1c17d1c276cd8c4d4e085eb7cb7786820db93ae
                                                          • Instruction ID: cfdda9bf872d8f56d48dddc2aad32cc7bd35a49b97d94753b661a6ad366238c1
                                                          • Opcode Fuzzy Hash: 73f19f14f871451f53f431c5b1c17d1c276cd8c4d4e085eb7cb7786820db93ae
                                                          • Instruction Fuzzy Hash: F8217F35812305EBDB119F29DC197E97BB8FB10355F100316F628E62B0E3709996DFA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 2bf01e8cb456f56bb2d309baee88e8ab706d38f0c82a9602ac630cdc19e414a6
                                                          • Instruction ID: e179099bd8a9f403cd3a0a1fd6f8d5bb254a7dae10daa45c573b58a424cb4738
                                                          • Opcode Fuzzy Hash: 2bf01e8cb456f56bb2d309baee88e8ab706d38f0c82a9602ac630cdc19e414a6
                                                          • Instruction Fuzzy Hash: 3101BE61641609BFD7189611EE81FBB735C9FA2358F1C4024FD0C5A1C5F760ED14A6B1
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,00CCF2DE,00CD3863,00D71444,?,00CBFDF5,?,?,00CAA976,00000010,00D71440,00CA13FC,?,00CA13C6), ref: 00CD2DFD
                                                          • _free.LIBCMT ref: 00CD2E32
                                                          • _free.LIBCMT ref: 00CD2E59
                                                          • SetLastError.KERNEL32(00000000,00CA1129), ref: 00CD2E66
                                                          • SetLastError.KERNEL32(00000000,00CA1129), ref: 00CD2E6F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 3170660625-0
                                                          • Opcode ID: f63c696287517817bcb34d6c6b4012c19a27fe690e4975b6f0bfe2d8620e7edb
                                                          • Instruction ID: ded48248167df5121d10be0891f46440f75f78f2abb7d452d11ea624c4c8fc7c
                                                          • Opcode Fuzzy Hash: f63c696287517817bcb34d6c6b4012c19a27fe690e4975b6f0bfe2d8620e7edb
                                                          • Instruction Fuzzy Hash: 2F01D1326057006B861227356C45D2B2759ABE13A3B24442BF775E2792EAA4CD016130
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00CFFF41,80070057,?,?,?,00D0035E), ref: 00D0002B
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00CFFF41,80070057,?,?), ref: 00D00046
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00CFFF41,80070057,?,?), ref: 00D00054
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00CFFF41,80070057,?), ref: 00D00064
                                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00CFFF41,80070057,?,?), ref: 00D00070
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 26c4818e630c48796a4255c4cca3c53834892f726200da86d06c77f836a21ab8
                                                          • Instruction ID: 9a704889ea81dc86bf5a909d37aca91db5250af712eb2cb972f2db9e6223a87a
                                                          • Opcode Fuzzy Hash: 26c4818e630c48796a4255c4cca3c53834892f726200da86d06c77f836a21ab8
                                                          • Instruction Fuzzy Hash: 2D018F76610304BFDB104F68DC08BAA7EADEB48792F145124F909E2250DB71DE408BB0
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00D0E997
                                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 00D0E9A5
                                                          • Sleep.KERNEL32(00000000), ref: 00D0E9AD
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00D0E9B7
                                                          • Sleep.KERNEL32 ref: 00D0E9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 83933fe337fdb6cc1e847e0cdaf0cef872ac24e2632ab09394d2268226c0abd4
                                                          • Instruction ID: becd122e78c95907f2a6f665acbb3ddcacda4e49b3cedba092a2d2e3c5794744
                                                          • Opcode Fuzzy Hash: 83933fe337fdb6cc1e847e0cdaf0cef872ac24e2632ab09394d2268226c0abd4
                                                          • Instruction Fuzzy Hash: DA011731D01629DBCF00ABE6ED59BEDFB78FB09701F000956E946B2291CB7096549BB1
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D01114
                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,00D00B9B,?,?,?), ref: 00D01120
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00D00B9B,?,?,?), ref: 00D0112F
                                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00D00B9B,?,?,?), ref: 00D01136
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D0114D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: a037454f72b31d6b2349edce8019a0f03e3b193a09ebdd1fcddee65763679665
                                                          • Instruction ID: d818a71aa53f9ed42daf077cdb7a2743b85444cc7cdc2adb76691de38fad9d7a
                                                          • Opcode Fuzzy Hash: a037454f72b31d6b2349edce8019a0f03e3b193a09ebdd1fcddee65763679665
                                                          • Instruction Fuzzy Hash: DC011979210315BFDB154FA5DC49A6A3B6EEF893A0B244419FA49E73A0DA31DC009B70
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00D00FCA
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00D00FD6
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00D00FE5
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00D00FEC
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00D01002
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: ae44524099765b2b52c5ddb3765836f9e758c572fcea9754191346a049409459
                                                          • Instruction ID: fde9e87755b6bec3d6e7c4f91bbadab9b2de530bd4a500df23392c733f4e48ca
                                                          • Opcode Fuzzy Hash: ae44524099765b2b52c5ddb3765836f9e758c572fcea9754191346a049409459
                                                          • Instruction Fuzzy Hash: AAF04939210302ABDB224FA49C4AF5A3BADEF89762F144414FA89E7391CA70DC508B70
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00D0102A
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00D01036
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D01045
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00D0104C
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D01062
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 5f8892fa2ab18bf55f5c3850bcc32059cc18b32e071c90f6451773f895df3d9d
                                                          • Instruction ID: 952c53ef3ead99a5fe1467449a917d66fa50d8203abb71546d8f43cb0c5270f1
                                                          • Opcode Fuzzy Hash: 5f8892fa2ab18bf55f5c3850bcc32059cc18b32e071c90f6451773f895df3d9d
                                                          • Instruction Fuzzy Hash: E2F06D39210301EBDB215FA4EC4AF563BADEF89761F140418FA89E7390CA70D8508B70
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,?,?,?,00D1017D,?,00D132FC,?,00000001,00CE2592,?), ref: 00D10324
                                                          • CloseHandle.KERNEL32(?,?,?,?,00D1017D,?,00D132FC,?,00000001,00CE2592,?), ref: 00D10331
                                                          • CloseHandle.KERNEL32(?,?,?,?,00D1017D,?,00D132FC,?,00000001,00CE2592,?), ref: 00D1033E
                                                          • CloseHandle.KERNEL32(?,?,?,?,00D1017D,?,00D132FC,?,00000001,00CE2592,?), ref: 00D1034B
                                                          • CloseHandle.KERNEL32(?,?,?,?,00D1017D,?,00D132FC,?,00000001,00CE2592,?), ref: 00D10358
                                                          • CloseHandle.KERNEL32(?,?,?,?,00D1017D,?,00D132FC,?,00000001,00CE2592,?), ref: 00D10365
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 7c02d725690dffe70a213d9a16980f75ba7841f11d2855dddc842dea5a09bee1
                                                          • Instruction ID: 9a19aef2626f04e0ba42911a41c4e0e59c478513f481c60b2c17b61bc4342328
                                                          • Opcode Fuzzy Hash: 7c02d725690dffe70a213d9a16980f75ba7841f11d2855dddc842dea5a09bee1
                                                          • Instruction Fuzzy Hash: 7401A272800B15AFC730AF66E880452FBF9BF503153198A3FD1A652931C7B1A995DF90
                                                          APIs
                                                          • _free.LIBCMT ref: 00CDD752
                                                            • Part of subcall function 00CD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000), ref: 00CD29DE
                                                            • Part of subcall function 00CD29C8: GetLastError.KERNEL32(00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000,00000000), ref: 00CD29F0
                                                          • _free.LIBCMT ref: 00CDD764
                                                          • _free.LIBCMT ref: 00CDD776
                                                          • _free.LIBCMT ref: 00CDD788
                                                          • _free.LIBCMT ref: 00CDD79A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 121bb96e487f32cfac66901736bfa74da37ae2f3b75630302f2fecf794591731
                                                          • Instruction ID: 07c47b4cfcfc2669e4e56b88127c269f35b40e47b4a79780e4b1ce3e47abf65c
                                                          • Opcode Fuzzy Hash: 121bb96e487f32cfac66901736bfa74da37ae2f3b75630302f2fecf794591731
                                                          • Instruction Fuzzy Hash: D6F09632950304AB8621FB64F9C1C2677DDBB44310B951C47F2A9D7705C730FC809A70
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00D05C58
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00D05C6F
                                                          • MessageBeep.USER32(00000000), ref: 00D05C87
                                                          • KillTimer.USER32(?,0000040A), ref: 00D05CA3
                                                          • EndDialog.USER32(?,00000001), ref: 00D05CBD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 817360b744b80f63ea25731d489f3cba832025a703153af05a36dd5dda2e6dd4
                                                          • Instruction ID: 47ce51fec2d8491a0bfe1201125f2b5650420dd3135ee55e5d20bd7940acf3af
                                                          • Opcode Fuzzy Hash: 817360b744b80f63ea25731d489f3cba832025a703153af05a36dd5dda2e6dd4
                                                          • Instruction Fuzzy Hash: 0A016D31510B04ABFB215B10EE4FFA67BB8BB00B05F042559A987B11E1DBF4A984CFA4
                                                          APIs
                                                          • _free.LIBCMT ref: 00CD22BE
                                                            • Part of subcall function 00CD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000), ref: 00CD29DE
                                                            • Part of subcall function 00CD29C8: GetLastError.KERNEL32(00000000,?,00CDD7D1,00000000,00000000,00000000,00000000,?,00CDD7F8,00000000,00000007,00000000,?,00CDDBF5,00000000,00000000), ref: 00CD29F0
                                                          • _free.LIBCMT ref: 00CD22D0
                                                          • _free.LIBCMT ref: 00CD22E3
                                                          • _free.LIBCMT ref: 00CD22F4
                                                          • _free.LIBCMT ref: 00CD2305
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 640d16d9d53646841d2c3c1e9b74d5e7045d01e285000f85d1d92d996953a7d1
                                                          • Instruction ID: 5c7ecf497af1a8b4224326145596209b74f16681b7a3a84e43301159dc436b55
                                                          • Opcode Fuzzy Hash: 640d16d9d53646841d2c3c1e9b74d5e7045d01e285000f85d1d92d996953a7d1
                                                          • Instruction Fuzzy Hash: 31F03A74810320CB8622BF68BC128187F64BB28760700160BF618D33B2EB700991BBB8
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 00CB95D4
                                                          • StrokeAndFillPath.GDI32(?,?,00CF71F7,00000000,?,?,?), ref: 00CB95F0
                                                          • SelectObject.GDI32(?,00000000), ref: 00CB9603
                                                          • DeleteObject.GDI32 ref: 00CB9616
                                                          • StrokePath.GDI32(?), ref: 00CB9631
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: 7052b8df5670a45896dbf1a9b43f20eb02deccf6895bb57e1e06ee4dfbef6438
                                                          • Instruction ID: dac40fc6769256e10b86d0cbe731b8300a37ba115ef0986a1bd21749f256c3d8
                                                          • Opcode Fuzzy Hash: 7052b8df5670a45896dbf1a9b43f20eb02deccf6895bb57e1e06ee4dfbef6438
                                                          • Instruction Fuzzy Hash: 44F0B639016344EBDB265F69ED187A43B65EB01362F048314F679E52F0E7308A96DF31
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: __freea$_free
                                                          • String ID: a/p$am/pm
                                                          • API String ID: 3432400110-3206640213
                                                          • Opcode ID: e39da1a7d59c4f85fe88327ae11a42436c2382651e4642389584c8cbd722fbd0
                                                          • Instruction ID: b50a6cfb02bc00edc6652b35965a438c09d4f8d9b1a2d2130ce8c823b6c9027e
                                                          • Opcode Fuzzy Hash: e39da1a7d59c4f85fe88327ae11a42436c2382651e4642389584c8cbd722fbd0
                                                          • Instruction Fuzzy Hash: 85D1D031900246EADB28AF69C855BBEB7B1EF05300F2C415BEF219B761D3759E80CB91
                                                          APIs
                                                            • Part of subcall function 00CC0242: EnterCriticalSection.KERNEL32(00D7070C,00D71884,?,?,00CB198B,00D72518,?,?,?,00CA12F9,00000000), ref: 00CC024D
                                                            • Part of subcall function 00CC0242: LeaveCriticalSection.KERNEL32(00D7070C,?,00CB198B,00D72518,?,?,?,00CA12F9,00000000), ref: 00CC028A
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                            • Part of subcall function 00CC00A3: __onexit.LIBCMT ref: 00CC00A9
                                                          • __Init_thread_footer.LIBCMT ref: 00D27BFB
                                                            • Part of subcall function 00CC01F8: EnterCriticalSection.KERNEL32(00D7070C,?,?,00CB8747,00D72514), ref: 00CC0202
                                                            • Part of subcall function 00CC01F8: LeaveCriticalSection.KERNEL32(00D7070C,?,00CB8747,00D72514), ref: 00CC0235
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                          • String ID: 5$G$Variable must be of type 'Object'.
                                                          • API String ID: 535116098-3733170431
                                                          • Opcode ID: 35ea4bf2fff7fcb13a870977aeadc8415bd5b940c55d99696a232173414abb54
                                                          • Instruction ID: ea3ff171e32484dde63211f58f7a32767b38ea00b43d026e8c6aa42f851bca72
                                                          • Opcode Fuzzy Hash: 35ea4bf2fff7fcb13a870977aeadc8415bd5b940c55d99696a232173414abb54
                                                          • Instruction Fuzzy Hash: 0091AC70A04219EFCB24EF54E881DADB7B1FF55308F148059F846AB292DB31AE45DB71
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\8f5WsFcnTc.exe,00000104), ref: 00CD1769
                                                          • _free.LIBCMT ref: 00CD1834
                                                          • _free.LIBCMT ref: 00CD183E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _free$FileModuleName
                                                          • String ID: C:\Users\user\Desktop\8f5WsFcnTc.exe
                                                          • API String ID: 2506810119-3246132998
                                                          • Opcode ID: 79e7b51217b91eb6b308d6476d73db104f33e570ba66e5b4c7b1adb8dbb2761c
                                                          • Instruction ID: 795ef62424904a9a78c24a1808206e1b89789b377a4b39208e965ba09969e18d
                                                          • Opcode Fuzzy Hash: 79e7b51217b91eb6b308d6476d73db104f33e570ba66e5b4c7b1adb8dbb2761c
                                                          • Instruction Fuzzy Hash: 75319175A00208FBDB21DF99DC85D9EBBFCEB85310B19416BFA04D7351E6708A40EBA0
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00D0C306
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00D0C34C
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00D71990,011658A8), ref: 00D0C395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem
                                                          • String ID: 0
                                                          • API String ID: 135850232-4108050209
                                                          • Opcode ID: 383f56fb9084f34b178d9727c78668b35165a10272b85b5c4340c7e948dcc667
                                                          • Instruction ID: bcd42ea82c81dbf48de4a2d9a4981f75b107712143ad6570c6f2e0a6f964a3a2
                                                          • Opcode Fuzzy Hash: 383f56fb9084f34b178d9727c78668b35165a10272b85b5c4340c7e948dcc667
                                                          • Instruction Fuzzy Hash: 33417C312243029FD720DF25D885B5ABBA8EB85320F149B1EF9A9972D1D770A904CB72
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00D3CC08,00000000,?,?,?,?), ref: 00D344AA
                                                          • GetWindowLongW.USER32 ref: 00D344C7
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00D344D7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: c33f98cb34699359307810443f50006ba5c51560a415573d1f0e0fcebf011abb
                                                          • Instruction ID: 7d897c9bad34e6184374ab0ef1a3fe41ec684f272468f89a95cf6722defd6a9d
                                                          • Opcode Fuzzy Hash: c33f98cb34699359307810443f50006ba5c51560a415573d1f0e0fcebf011abb
                                                          • Instruction Fuzzy Hash: B4318D32210205AFDB209F38DC45BEA77A9EB09334F244725F975E22E0D7B4EC509760
                                                          APIs
                                                            • Part of subcall function 00D2335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00D23077,?,?), ref: 00D23378
                                                          • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00D2307A
                                                          • _wcslen.LIBCMT ref: 00D2309B
                                                          • htons.WSOCK32(00000000,?,?,00000000), ref: 00D23106
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 946324512-2422070025
                                                          • Opcode ID: e90d6dac6ff85d59865307209324a80b398a4dbc1f8b9fa7d4fc23ccb746e82a
                                                          • Instruction ID: 6c22941f4c53e3917ae4582ae9e5b9ebf12fbcf77a5c550a37a5a45dac0ffdf3
                                                          • Opcode Fuzzy Hash: e90d6dac6ff85d59865307209324a80b398a4dbc1f8b9fa7d4fc23ccb746e82a
                                                          • Instruction Fuzzy Hash: 2231B0352043259FCB10CF68D586EAA77E0EF6531CF288059E9158B392DB7AEE41C770
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00D34705
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00D34713
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00D3471A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: 5cfab165068162f9da1252805a6d1f49e4a980d87e7719c24cecd47f345d4aba
                                                          • Instruction ID: 68c7175d087163f3e3ee934903958c3aeb4c0006d300a7af2a5220361dd9ff9f
                                                          • Opcode Fuzzy Hash: 5cfab165068162f9da1252805a6d1f49e4a980d87e7719c24cecd47f345d4aba
                                                          • Instruction Fuzzy Hash: 42214AB5600209AFDB10DF68DC81DA637ADEB4A3A8B040159FA049B3A1DB74FC51DAB0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 176396367-2734436370
                                                          • Opcode ID: 0119be60e0c364c276eefdf47b5f43c4da883084878886970028c74ca61f0990
                                                          • Instruction ID: efc0c6f8d5a331405ccd8eb3db2fd5c01b3bc3f22ee815dcf89639e3397323b5
                                                          • Opcode Fuzzy Hash: 0119be60e0c364c276eefdf47b5f43c4da883084878886970028c74ca61f0990
                                                          • Instruction Fuzzy Hash: D42138725045116AC331AB25DC26FB7F398AF51310F58402AF98D971C2EB52DD46D2B5
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00D33840
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00D33850
                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00D33876
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: aa2bcd428f0e09b98fc61f51b0811775a4aca8dcabc2a6ee6a4e43364c76f81f
                                                          • Instruction ID: 2df3893257a178b02770f687e22cc328790f7d71c2dc32b684669c55366504a2
                                                          • Opcode Fuzzy Hash: aa2bcd428f0e09b98fc61f51b0811775a4aca8dcabc2a6ee6a4e43364c76f81f
                                                          • Instruction Fuzzy Hash: 3A21A1B2610218BBEF218F54DC85FBB376EEF89764F158124F9449B190C671DC5287B0
                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D02258
                                                            • Part of subcall function 00CA6B57: _wcslen.LIBCMT ref: 00CA6B6A
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D0228A
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D022CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen
                                                          • String ID: @U=u
                                                          • API String ID: 763830540-2594219639
                                                          • Opcode ID: 490b26e558f5a8ee11a5c33b2d56466d8ac8d193ece6a2729ad08b05c460c4c2
                                                          • Instruction ID: cd836b8bffa6052b4889d6a6a70061d29d563d46b4a674f03a9bd89a6189fff7
                                                          • Opcode Fuzzy Hash: 490b26e558f5a8ee11a5c33b2d56466d8ac8d193ece6a2729ad08b05c460c4c2
                                                          • Instruction Fuzzy Hash: 5121D731701304ABDB109BA59D8EFFE3BA8EB59710F085028FA09E72D0D770D94597B1
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00D14A08
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00D14A5C
                                                          • SetErrorMode.KERNEL32(00000000,?,?,00D3CC08), ref: 00D14AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume
                                                          • String ID: %lu
                                                          • API String ID: 2507767853-685833217
                                                          • Opcode ID: a4291e9e6e3452a3f806bc92a97ce2b2921400e30e11e4c0bc2f9534c255c5b4
                                                          • Instruction ID: 4b5fe2a7864eacd42fea3e8b48ad397b9840df6e7e2edb5a890128aa31e1dfa9
                                                          • Opcode Fuzzy Hash: a4291e9e6e3452a3f806bc92a97ce2b2921400e30e11e4c0bc2f9534c255c5b4
                                                          • Instruction Fuzzy Hash: 02317F75A00209AFD710DF54C885EAA7BF8EF05308F148095F909DB252DB71ED45DB71
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00D01B4F
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00D01B61
                                                          • SendMessageW.USER32(?,0000000D,?,00000000), ref: 00D01B99
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 3850602802-2594219639
                                                          • Opcode ID: d31271184b52df5cfcf1a92bb482e245a39593d4ee48de62e82abfbafd79a64f
                                                          • Instruction ID: ccb5feedc403efb5541e2c10a9e4eb3abd26edb1ca53b81bba42fca6475fba06
                                                          • Opcode Fuzzy Hash: d31271184b52df5cfcf1a92bb482e245a39593d4ee48de62e82abfbafd79a64f
                                                          • Instruction Fuzzy Hash: 76219635600118BFDB15DB98D941EAEB7FEEF45340F14045AE109E3290DB71AE40DB64
                                                          APIs
                                                          • SendMessageW.USER32(00000402,00000000,00000000), ref: 00D20D24
                                                          • SendMessageW.USER32(0000000C,00000000,?), ref: 00D20D65
                                                          • SendMessageW.USER32(0000000C,00000000,?), ref: 00D20D8D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 3850602802-2594219639
                                                          • Opcode ID: 621c38312eeaf8baeed13222db5427ca9a2514e7cb6eddd00ada837a8215dbd0
                                                          • Instruction ID: 9255d86350eb11d7bbb6a9363c9d8880f0c43af2fe1e1158ec570ff6e9994952
                                                          • Opcode Fuzzy Hash: 621c38312eeaf8baeed13222db5427ca9a2514e7cb6eddd00ada837a8215dbd0
                                                          • Instruction Fuzzy Hash: 46213835600611AFE710EB68E991D2AB7E6FB0A314B048655F909DBA72D720FC50DBA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00D3424F
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00D34264
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00D34271
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 0ba0fb3e5e55bff6f6f3054ead82a39dca2a7a4d1cf352edc583666bc3351fec
                                                          • Instruction ID: 70eaf927afcb3a403a0765109d5c0ed4326c71dd97940b86b450c656e91a26de
                                                          • Opcode Fuzzy Hash: 0ba0fb3e5e55bff6f6f3054ead82a39dca2a7a4d1cf352edc583666bc3351fec
                                                          • Instruction Fuzzy Hash: 9711E031240308BFEF205E29CC06FAB3BACEF85B64F010224FA55E21A0D271E8519B34
                                                          APIs
                                                            • Part of subcall function 00CA6B57: _wcslen.LIBCMT ref: 00CA6B6A
                                                            • Part of subcall function 00D02DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00D02DC5
                                                            • Part of subcall function 00D02DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D02DD6
                                                            • Part of subcall function 00D02DA7: GetCurrentThreadId.KERNEL32 ref: 00D02DDD
                                                            • Part of subcall function 00D02DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00D02DE4
                                                          • GetFocus.USER32 ref: 00D02F78
                                                            • Part of subcall function 00D02DEE: GetParent.USER32(00000000), ref: 00D02DF9
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00D02FC3
                                                          • EnumChildWindows.USER32(?,00D0303B), ref: 00D02FEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                          • String ID: %s%d
                                                          • API String ID: 1272988791-1110647743
                                                          • Opcode ID: 948b1408e5d8726e92d8dd3eeb3f0437d7339f86e1e20db71a56eaa136565823
                                                          • Instruction ID: d2f46afb90eb980229adb20b783d7b6831cda9279a0181405ba9cf8100b1f40d
                                                          • Opcode Fuzzy Hash: 948b1408e5d8726e92d8dd3eeb3f0437d7339f86e1e20db71a56eaa136565823
                                                          • Instruction Fuzzy Hash: CD11AF71700205ABCF15BF649C8AFEE776AEF84304F085075B90DAB292DE3099499B70
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 00D334AB
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00D334BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: @U=u$edit
                                                          • API String ID: 2978978980-590756393
                                                          • Opcode ID: 1cdbfd97c3531672ac8069af41916cd61ef7328c90d894561dce38ef8250e6d5
                                                          • Instruction ID: cee2b31fcd50e6f8810a1cf585c67848a28b6c39bc8361c39bae8a9024befc69
                                                          • Opcode Fuzzy Hash: 1cdbfd97c3531672ac8069af41916cd61ef7328c90d894561dce38ef8250e6d5
                                                          • Instruction Fuzzy Hash: BE118C71100208AFEB228F64DD44AAB376AEB05378F544324F965E32E0C771DCA19B70
                                                          APIs
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                            • Part of subcall function 00D03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00D03CCA
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00D01D4C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: @U=u$ComboBox$ListBox
                                                          • API String ID: 624084870-2258501812
                                                          • Opcode ID: 250fa69921cad5da4109ee6be79e985d1462d6d90aa0d4855a8d75d7f275b08a
                                                          • Instruction ID: 7fc9003d59de370618befe3fde8f8f272cd8a048a6546a9b3e799837d2f91266
                                                          • Opcode Fuzzy Hash: 250fa69921cad5da4109ee6be79e985d1462d6d90aa0d4855a8d75d7f275b08a
                                                          • Instruction Fuzzy Hash: 1B01D875601225ABCB04EBA4CC56EFE7368EB47354F040619F876673D1EA3099089770
                                                          APIs
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                            • Part of subcall function 00D03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00D03CCA
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00D01C46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: @U=u$ComboBox$ListBox
                                                          • API String ID: 624084870-2258501812
                                                          • Opcode ID: 569a9ca7658ddb662a037aa41171bd678e09f08a644b943cdb36818a78b11e06
                                                          • Instruction ID: 07a5920c1f55ad450828bba99e33109c51c9c1de6d8d8a9ee527238ef51c7acb
                                                          • Opcode Fuzzy Hash: 569a9ca7658ddb662a037aa41171bd678e09f08a644b943cdb36818a78b11e06
                                                          • Instruction Fuzzy Hash: C101A7757811056BDB08EB90C956BFFB7A8DB12344F140019F41A772C1EA24DE4C96B5
                                                          APIs
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                            • Part of subcall function 00D03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00D03CCA
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00D01CC8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: @U=u$ComboBox$ListBox
                                                          • API String ID: 624084870-2258501812
                                                          • Opcode ID: 4801c5a46b710dd810b06c4abf73ba4740d896c33b7dd0c6a6f6aa067ade366b
                                                          • Instruction ID: a586625bec0257a22d38af50f10fbaeb1de5f9ed347b01ee4788ae76e42d6643
                                                          • Opcode Fuzzy Hash: 4801c5a46b710dd810b06c4abf73ba4740d896c33b7dd0c6a6f6aa067ade366b
                                                          • Instruction Fuzzy Hash: 2C01D675B801196BEB04EBA5CA16BFEB3ACDB12384F140015B80AB32C1EA70DF08D675
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00D358C1
                                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00D358EE
                                                          • DrawMenuBar.USER32(?), ref: 00D358FD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Menu$InfoItem$Draw
                                                          • String ID: 0
                                                          • API String ID: 3227129158-4108050209
                                                          • Opcode ID: ac99c8e8f74773f0f1ef57e23622726c006ebed87b427e8aa99fba3fb06e23c7
                                                          • Instruction ID: 1d6cca0e08f95b72883015f7fcda34752bb14af1448f56866782a6c3c957f93d
                                                          • Opcode Fuzzy Hash: ac99c8e8f74773f0f1ef57e23622726c006ebed87b427e8aa99fba3fb06e23c7
                                                          • Instruction Fuzzy Hash: 0D018031500258EFDB219F11EC44BEEBBB4FF45360F1480A9E849D6251DB308A94EF31
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,00D718B0,00D3A364,000000FC,?,00000000,00000000,?,?,?,00CF76CF,?,?,?,?,?), ref: 00D37805
                                                          • GetFocus.USER32 ref: 00D3780D
                                                            • Part of subcall function 00CB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CB9BB2
                                                            • Part of subcall function 00CB9944: GetWindowLongW.USER32(?,000000EB), ref: 00CB9952
                                                          • SendMessageW.USER32(0116EBD0,000000B0,000001BC,000001C0), ref: 00D3787A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$FocusForegroundMessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 3601265619-2594219639
                                                          • Opcode ID: c745bb24ee460c431305627e7ec5889effa335557bd1eb0fecb431ad5d9aae8b
                                                          • Instruction ID: c682f439cb4f8b5cc61f8fdd213d9b4b806d4db84191ecf74e0174eeeafbbe6e
                                                          • Opcode Fuzzy Hash: c745bb24ee460c431305627e7ec5889effa335557bd1eb0fecb431ad5d9aae8b
                                                          • Instruction Fuzzy Hash: A6017C756016009FC335DB28D858AA633E6EF8A320F180269E529C73A0DB316C42CFA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 11cd7a6c7f012c589099e06b5273bc4845e715195d7697f7318f6d15ab68e4a3
                                                          • Instruction ID: 9de9c928f975dbb876698e99c807234a88c742e670fc9953d31a7e9871dba9fb
                                                          • Opcode Fuzzy Hash: 11cd7a6c7f012c589099e06b5273bc4845e715195d7697f7318f6d15ab68e4a3
                                                          • Instruction Fuzzy Hash: D5C12C75A0021AEFDB15CFA4C894BAEBBB5FF48704F148598E509EB291D731DE41CBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInitInitializeUninitialize
                                                          • String ID:
                                                          • API String ID: 1998397398-0
                                                          • Opcode ID: 8d8a25052616ee97d67e6fe5f6c284eb8919761bd6334878bdea7699e8b68562
                                                          • Instruction ID: fbe029226163988aae6b978e992a8d9408fd064b2c92ff29dd814c3bd2ff61b4
                                                          • Opcode Fuzzy Hash: 8d8a25052616ee97d67e6fe5f6c284eb8919761bd6334878bdea7699e8b68562
                                                          • Instruction Fuzzy Hash: 32A16F756043119FC700EF28D885A2AB7E5FF89718F04895DF98A9B362DB34ED01DBA1
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00D3FC08,?), ref: 00D005F0
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00D3FC08,?), ref: 00D00608
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,00D3CC40,000000FF,?,00000000,00000800,00000000,?,00D3FC08,?), ref: 00D0062D
                                                          • _memcmp.LIBVCRUNTIME ref: 00D0064E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: 80b58429e047ecd33201e5cbaf758b97555ad574cb52b7e3a2dafbe8f617ea42
                                                          • Instruction ID: 8b466de0a869d027d1c2e9debfd29009a4855856c5245400963f463f85e0c294
                                                          • Opcode Fuzzy Hash: 80b58429e047ecd33201e5cbaf758b97555ad574cb52b7e3a2dafbe8f617ea42
                                                          • Instruction Fuzzy Hash: 9181FE75A00109EFCB04DF94C988EEEBBB9FF89315F144558E516EB290DB71AE06CB60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 24767c41011c702e52f4ee4aafe382e24c09a2ab7ef4852a1affdf3219cb96bd
                                                          • Instruction ID: f7d7d1ae325220629ea918f4d5b6bfaa6991662abdeeacf575a67228803eae90
                                                          • Opcode Fuzzy Hash: 24767c41011c702e52f4ee4aafe382e24c09a2ab7ef4852a1affdf3219cb96bd
                                                          • Instruction Fuzzy Hash: 31413E35A005906BDB216BBBCC45BBE3AA5EF41330F1C0269FD29D63D2E6348951B272
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00D21AFD
                                                          • WSAGetLastError.WSOCK32 ref: 00D21B0B
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00D21B8A
                                                          • WSAGetLastError.WSOCK32 ref: 00D21B94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$socket
                                                          • String ID:
                                                          • API String ID: 1881357543-0
                                                          • Opcode ID: f2bb6c4a03ae3f1fc5934b2a01739cd906fb14d775aaf8abfbf09ed83eef5785
                                                          • Instruction ID: 6ec5d5077b5272131ca9e34c9e8072470d6c325a01d22102ed00c7d51eb9a42c
                                                          • Opcode Fuzzy Hash: f2bb6c4a03ae3f1fc5934b2a01739cd906fb14d775aaf8abfbf09ed83eef5785
                                                          • Instruction Fuzzy Hash: 2541D138600201AFE720AF24D886F2A77E5AB55718F58C448F91A9F3D2D772DD41CBA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e64f6a5505b1e893a14c63466c46314e97379ca3a7baa7abafe8bcdc78503561
                                                          • Instruction ID: cda0bd4a16831265e780ecbc2e0f9e7f909cadb7b9ed31b1081ee468e9171e95
                                                          • Opcode Fuzzy Hash: e64f6a5505b1e893a14c63466c46314e97379ca3a7baa7abafe8bcdc78503561
                                                          • Instruction Fuzzy Hash: 9941D171A00244EFD724DF38C841BAABBE9EB88710F11452FF651DB382D7719A019790
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00D15783
                                                          • GetLastError.KERNEL32(?,00000000), ref: 00D157A9
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00D157CE
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00D157FA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: d1aaab5d3b268a853e4d410f2fa194aac51e17d9537d6b0cd8cdbc64c404a558
                                                          • Instruction ID: 0e2c3154acc8cb66708041be3eb5cb5306e96b4877f0d616b647fc2acf26b939
                                                          • Opcode Fuzzy Hash: d1aaab5d3b268a853e4d410f2fa194aac51e17d9537d6b0cd8cdbc64c404a558
                                                          • Instruction Fuzzy Hash: 0A411F39600611DFCB11EF55D585A5EBBE2FF89314B198488E84AAB362CB34FD40DBA1
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00CC6D71,00000000,00000000,00CC82D9,?,00CC82D9,?,00000001,00CC6D71,8BE85006,00000001,00CC82D9,00CC82D9), ref: 00CDD910
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00CDD999
                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00CDD9AB
                                                          • __freea.LIBCMT ref: 00CDD9B4
                                                            • Part of subcall function 00CD3820: RtlAllocateHeap.NTDLL(00000000,?,00D71444,?,00CBFDF5,?,?,00CAA976,00000010,00D71440,00CA13FC,?,00CA13C6,?,00CA1129), ref: 00CD3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                          • String ID:
                                                          • API String ID: 2652629310-0
                                                          • Opcode ID: 22f2b382b5eec745cdbc815481f827a0d7b972d7f6ac5783c550efc9c2a81abc
                                                          • Instruction ID: 7faf747da9a2002988d929bd4ff96ec4bd38e358fca4c79b8081563979d99ddb
                                                          • Opcode Fuzzy Hash: 22f2b382b5eec745cdbc815481f827a0d7b972d7f6ac5783c550efc9c2a81abc
                                                          • Instruction Fuzzy Hash: 4531FE72A1020AABDF249F65DC91EBE7BA5EB40310F05016AFD15D7290EB36CE50DBA0
                                                          APIs
                                                          • GetKeyboardState.USER32(?,753DC0D0,?,00008000), ref: 00D0ABF1
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00D0AC0D
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00D0AC74
                                                          • SendInput.USER32(00000001,?,0000001C,753DC0D0,?,00008000), ref: 00D0ACC6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 5921694d921020da725de9eabe25f2769fa2f6a9da02aaaefb841110e60be66b
                                                          • Instruction ID: 69c9765a6b40b3b604393fbc8ecf60b9776fe9a7a1793e5cd1b55a2f3c7f1bd0
                                                          • Opcode Fuzzy Hash: 5921694d921020da725de9eabe25f2769fa2f6a9da02aaaefb841110e60be66b
                                                          • Instruction Fuzzy Hash: 07310734A04718AFFF35CB69CC097FE7BA5AB89310F09431AE48D962D1C3758985877A
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 00D3769A
                                                          • GetWindowRect.USER32(?,?), ref: 00D37710
                                                          • PtInRect.USER32(?,?,00D38B89), ref: 00D37720
                                                          • MessageBeep.USER32(00000000), ref: 00D3778C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: 5b51fff253dbac9df26f45cbc94ec69b1fa6bd2bb91d8c218a97e9bb783704f6
                                                          • Instruction ID: a7e7b7517c306ed1e22019907278597f0f08dbf9d67dd790103e8d276135ae9c
                                                          • Opcode Fuzzy Hash: 5b51fff253dbac9df26f45cbc94ec69b1fa6bd2bb91d8c218a97e9bb783704f6
                                                          • Instruction Fuzzy Hash: 31419CB8605A14AFCB21CF58C895EA977F4FB49310F1841A8E524DB361D330E942CFB0
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 00D316EB
                                                            • Part of subcall function 00D03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D03A57
                                                            • Part of subcall function 00D03A3D: GetCurrentThreadId.KERNEL32 ref: 00D03A5E
                                                            • Part of subcall function 00D03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00D025B3), ref: 00D03A65
                                                          • GetCaretPos.USER32(?), ref: 00D316FF
                                                          • ClientToScreen.USER32(00000000,?), ref: 00D3174C
                                                          • GetForegroundWindow.USER32 ref: 00D31752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: d6e7b22bf1bee106ff7cb56a96010d0b87db30a7f6a3bc1e5e0dc56c79be9fe8
                                                          • Instruction ID: 8451a7a67ffe4380131ae7fd3e1195ded95e879980455a8cdd3c04a4ba1d55f4
                                                          • Opcode Fuzzy Hash: d6e7b22bf1bee106ff7cb56a96010d0b87db30a7f6a3bc1e5e0dc56c79be9fe8
                                                          • Instruction Fuzzy Hash: B33121B5D00249AFC704DFA9C881DAEB7FDEF49308B548069E415E7251D731DE45CBA0
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00D0D501
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00D0D50F
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00D0D52F
                                                          • CloseHandle.KERNEL32(00000000), ref: 00D0D5DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 420147892-0
                                                          • Opcode ID: dff6fa6f652f3333f315d43291d58441585e7875a5dfbcc68395598bbd9edd22
                                                          • Instruction ID: 0cc403b23023b19200f5f6bc90626b6333adc13047e4deeb2e5b1b9fe9f383d6
                                                          • Opcode Fuzzy Hash: dff6fa6f652f3333f315d43291d58441585e7875a5dfbcc68395598bbd9edd22
                                                          • Instruction Fuzzy Hash: B83191721083019FD300EF64CC85BAFBBE8EF9A358F14092DF585961E1EB719945DBA2
                                                          APIs
                                                            • Part of subcall function 00CB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CB9BB2
                                                          • GetCursorPos.USER32(?), ref: 00D39001
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00CF7711,?,?,?,?,?), ref: 00D39016
                                                          • GetCursorPos.USER32(?), ref: 00D3905E
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00CF7711,?,?,?), ref: 00D39094
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: b724280f7d33b0b56683d51e90b144626d33fe0d03030d40b44ec930501547f5
                                                          • Instruction ID: 6febfcf3a58037e3d795d3e2a8ef8a029e766f2808a8969ce8e792a1c773d0d2
                                                          • Opcode Fuzzy Hash: b724280f7d33b0b56683d51e90b144626d33fe0d03030d40b44ec930501547f5
                                                          • Instruction Fuzzy Hash: 5D21D135600218EFCB298FA8CC68EFABBB9EF49350F084155F90597261D3719990EB70
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,00D3CB68), ref: 00D0D2FB
                                                          • GetLastError.KERNEL32 ref: 00D0D30A
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00D0D319
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00D3CB68), ref: 00D0D376
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: 84fe7038ce901278ec9adea052c51c1fb508f1cf92e838f707b9c4023189f44d
                                                          • Instruction ID: cb3d848ac8845574e81ed7bf22e6a401ffc7d8ed81416e5e0e7ab5c14a1e370f
                                                          • Opcode Fuzzy Hash: 84fe7038ce901278ec9adea052c51c1fb508f1cf92e838f707b9c4023189f44d
                                                          • Instruction Fuzzy Hash: 0D21A1705093029FC700DFA8C88196BB7E4EE56368F544A1EF499D32E1D730D94ACBA3
                                                          APIs
                                                            • Part of subcall function 00D01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00D0102A
                                                            • Part of subcall function 00D01014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00D01036
                                                            • Part of subcall function 00D01014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D01045
                                                            • Part of subcall function 00D01014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00D0104C
                                                            • Part of subcall function 00D01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D01062
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00D015BE
                                                          • _memcmp.LIBVCRUNTIME ref: 00D015E1
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D01617
                                                          • HeapFree.KERNEL32(00000000), ref: 00D0161E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: f56aa0ba45121b4dae35286a5882b991bbbe83309d163d2e49ea035d322f675e
                                                          • Instruction ID: d5ce3e44ec7419aafafe9457bacfdd62a530c2bb165ecac8ee4ed3edb9a64e0d
                                                          • Opcode Fuzzy Hash: f56aa0ba45121b4dae35286a5882b991bbbe83309d163d2e49ea035d322f675e
                                                          • Instruction Fuzzy Hash: 52217832E00208AFDB14DFA4CD49BEEB7B8EF44344F084459E449AB281E731AA45DBA0
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00D3280A
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00D32824
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00D32832
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00D32840
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: fc79cfc6acc5a13bb010b6ff95a753c44ffac64ba96385b07d922dd6fae0fd9f
                                                          • Instruction ID: 36dad5dfa52540e9ac41b126f5cc85e0585585a6d4b9ffc93bab044e5a85c446
                                                          • Opcode Fuzzy Hash: fc79cfc6acc5a13bb010b6ff95a753c44ffac64ba96385b07d922dd6fae0fd9f
                                                          • Instruction Fuzzy Hash: C121A131A05611AFD7149B24C855FBA7BA5EF45324F188158F466CB6E2C771FC42C7A0
                                                          APIs
                                                            • Part of subcall function 00D08D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00D0790A,?,000000FF,?,00D08754,00000000,?,0000001C,?,?), ref: 00D08D8C
                                                            • Part of subcall function 00D08D7D: lstrcpyW.KERNEL32(00000000,?), ref: 00D08DB2
                                                            • Part of subcall function 00D08D7D: lstrcmpiW.KERNEL32(00000000,?,00D0790A,?,000000FF,?,00D08754,00000000,?,0000001C,?,?), ref: 00D08DE3
                                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00D08754,00000000,?,0000001C,?,?,00000000), ref: 00D07923
                                                          • lstrcpyW.KERNEL32(00000000,?), ref: 00D07949
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00D08754,00000000,?,0000001C,?,?,00000000), ref: 00D07984
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: 47003f6a128d3d0389aecac8277da3c0b54866a99d9c1dbcef4084216c9d33b6
                                                          • Instruction ID: 4466659afdc102487063e6467e2234823562ab4f5e7c937ce8702609eebb3f18
                                                          • Opcode Fuzzy Hash: 47003f6a128d3d0389aecac8277da3c0b54866a99d9c1dbcef4084216c9d33b6
                                                          • Instruction Fuzzy Hash: E211B43A600341AFCB155F34D845EBA77A9FF45350B54402AE94ACB3A4EB71D811DBB1
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00D37D0B
                                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00D37D2A
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00D37D42
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00D1B7AD,00000000), ref: 00D37D6B
                                                            • Part of subcall function 00CB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CB9BB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID:
                                                          • API String ID: 847901565-0
                                                          • Opcode ID: c1c803b10b84db20d3f646f3ee8b194363f563b92a6b06eae16aeb36601714c5
                                                          • Instruction ID: d5fec4c01086028f394e7e785c56d51006ea8335b696b57b6c23220b6dcbae36
                                                          • Opcode Fuzzy Hash: c1c803b10b84db20d3f646f3ee8b194363f563b92a6b06eae16aeb36601714c5
                                                          • Instruction Fuzzy Hash: 2511DF72214A54EFCB208F28DC04AA63BA4AF45360F198324F939D72F0E730C952DB60
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00D01A47
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D01A59
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D01A6F
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D01A8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 096e13cb119c49c7a2f2d56afada9fb63130da9762c9a602e74a6d9882d152aa
                                                          • Instruction ID: 6b061dcd810ea03a11c46235013cec7d16eb44a48767dfbdb25c8ed4a84c0c3d
                                                          • Opcode Fuzzy Hash: 096e13cb119c49c7a2f2d56afada9fb63130da9762c9a602e74a6d9882d152aa
                                                          • Instruction Fuzzy Hash: 8711FA3AA01219FFEB119BA5CD85FADBB78EB04754F200091E604B7290D6716E51DBA4
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00D0E1FD
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00D0E230
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00D0E246
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00D0E24D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: 0361c4ad605c399c426a0455df0b45232291e7831d20c6132a3cf121f491e8a4
                                                          • Instruction ID: cfb620cb10dd0b0855ab46921476a02eb59ce51bc2520d0621b3428cc1decf4f
                                                          • Opcode Fuzzy Hash: 0361c4ad605c399c426a0455df0b45232291e7831d20c6132a3cf121f491e8a4
                                                          • Instruction Fuzzy Hash: 7C11AD76904358BBC7019BA8AC09B9A7BACAB45324F044769F929E3391E6B0C94487B0
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,?,00CCCFF9,00000000,00000004,00000000), ref: 00CCD218
                                                          • GetLastError.KERNEL32 ref: 00CCD224
                                                          • __dosmaperr.LIBCMT ref: 00CCD22B
                                                          • ResumeThread.KERNEL32(00000000), ref: 00CCD249
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                          • String ID:
                                                          • API String ID: 173952441-0
                                                          • Opcode ID: 8d1003379ca001ec579ebf3d3dbf06b1654ad2e1d3f5bce846d37f11369c8d48
                                                          • Instruction ID: 70f1bee55d6ebb65f382c6a4ed949c79743a96c68afed9093278f78a5aebf20f
                                                          • Opcode Fuzzy Hash: 8d1003379ca001ec579ebf3d3dbf06b1654ad2e1d3f5bce846d37f11369c8d48
                                                          • Instruction Fuzzy Hash: 7A01D276805204BBCB216BA5DC09FAE7A6DDF81331F20022DF926921D0CB70CD41E7A0
                                                          APIs
                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 00CC3B56
                                                            • Part of subcall function 00CC3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00CC3AD2
                                                            • Part of subcall function 00CC3AA3: ___AdjustPointer.LIBCMT ref: 00CC3AED
                                                          • _UnwindNestedFrames.LIBCMT ref: 00CC3B6B
                                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00CC3B7C
                                                          • CallCatchBlock.LIBVCRUNTIME ref: 00CC3BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                          • String ID:
                                                          • API String ID: 737400349-0
                                                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction ID: 50cfa37b2020b7fe82f3beca904313014b8739cd062866351e8570080e37d389
                                                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction Fuzzy Hash: E0010C32100189BBDF125E95DC46EEB7F7EEF58754F048018FE5896121C732E961EBA0
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00CA13C6,00000000,00000000,?,00CD301A,00CA13C6,00000000,00000000,00000000,?,00CD328B,00000006,FlsSetValue), ref: 00CD30A5
                                                          • GetLastError.KERNEL32(?,00CD301A,00CA13C6,00000000,00000000,00000000,?,00CD328B,00000006,FlsSetValue,00D42290,FlsSetValue,00000000,00000364,?,00CD2E46), ref: 00CD30B1
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00CD301A,00CA13C6,00000000,00000000,00000000,?,00CD328B,00000006,FlsSetValue,00D42290,FlsSetValue,00000000), ref: 00CD30BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3177248105-0
                                                          • Opcode ID: 8539b6737afcaef4e2887e9c3a5b11c39b0c45278b06f7953506ed67160a5d92
                                                          • Instruction ID: e64f0b9406c5c596ce4357ed7eea4688d6e0a45d846cc5ef5c1cd7406fd38d20
                                                          • Opcode Fuzzy Hash: 8539b6737afcaef4e2887e9c3a5b11c39b0c45278b06f7953506ed67160a5d92
                                                          • Instruction Fuzzy Hash: 49012B36311362ABCB314B79AC449577B98AF45B61B140621FB15F3380D721EA01C7F1
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00D0747F
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00D07497
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00D074AC
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00D074CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 3b9fef2a1edb097ad38900ba9353de3d0b36bfc76c7c2c4cbdad6cdfa985f4ac
                                                          • Instruction ID: 05c20d061389f11af8cfd0f0a11012cd28502c534bc628186ed6d5f7470a99d4
                                                          • Opcode Fuzzy Hash: 3b9fef2a1edb097ad38900ba9353de3d0b36bfc76c7c2c4cbdad6cdfa985f4ac
                                                          • Instruction Fuzzy Hash: 2E1180B5A05315AFE7208F54EC09F927FFCEB00B04F108569A65AEA191D7B0F904DB70
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00D0ACD3,?,00008000), ref: 00D0B0C4
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00D0ACD3,?,00008000), ref: 00D0B0E9
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00D0ACD3,?,00008000), ref: 00D0B0F3
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00D0ACD3,?,00008000), ref: 00D0B126
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: 7617ff0a15e48bbace7e6127c23c287aba3dc757e50347794fad70956f549c46
                                                          • Instruction ID: bb790c3e7c60658f9020b5543013f488875f311db1a743785d700f4696d5265e
                                                          • Opcode Fuzzy Hash: 7617ff0a15e48bbace7e6127c23c287aba3dc757e50347794fad70956f549c46
                                                          • Instruction Fuzzy Hash: 26113C31D05718D7CF009FA4D9587EEBB78FF1A721F104086D945B2281CB7095509B72
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00D02DC5
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00D02DD6
                                                          • GetCurrentThreadId.KERNEL32 ref: 00D02DDD
                                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00D02DE4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 6d833fb474ba774ac9e27776e06e838e0ca1a882e620d7a819e1da7d95deaac0
                                                          • Instruction ID: 627a46026a9c8e80171f92ba161ec65b0e73296ffd2a0de8f05596f87dbf832e
                                                          • Opcode Fuzzy Hash: 6d833fb474ba774ac9e27776e06e838e0ca1a882e620d7a819e1da7d95deaac0
                                                          • Instruction Fuzzy Hash: 9CE092716123247BDB201B729C0EFFB3E6CEF42BA1F041015F109E11909AA4C840C7F0
                                                          APIs
                                                            • Part of subcall function 00CB9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00CB9693
                                                            • Part of subcall function 00CB9639: SelectObject.GDI32(?,00000000), ref: 00CB96A2
                                                            • Part of subcall function 00CB9639: BeginPath.GDI32(?), ref: 00CB96B9
                                                            • Part of subcall function 00CB9639: SelectObject.GDI32(?,00000000), ref: 00CB96E2
                                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00D38887
                                                          • LineTo.GDI32(?,?,?), ref: 00D38894
                                                          • EndPath.GDI32(?), ref: 00D388A4
                                                          • StrokePath.GDI32(?), ref: 00D388B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: cdbd167efcdfef795879ff015df212bfc92b56f8dbf1eac3cf00909374924c55
                                                          • Instruction ID: 4229e7b4008b76d762b654967f62d21e5ee42b8a24c6416ec23341f02751d7b2
                                                          • Opcode Fuzzy Hash: cdbd167efcdfef795879ff015df212bfc92b56f8dbf1eac3cf00909374924c55
                                                          • Instruction Fuzzy Hash: A4F03A36055758BADB125F98AC09FCA3B69AF06310F088100FB12B52E2C7B55551DFF5
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 00CB98CC
                                                          • SetTextColor.GDI32(?,?), ref: 00CB98D6
                                                          • SetBkMode.GDI32(?,00000001), ref: 00CB98E9
                                                          • GetStockObject.GDI32(00000005), ref: 00CB98F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Color$ModeObjectStockText
                                                          • String ID:
                                                          • API String ID: 4037423528-0
                                                          • Opcode ID: 99115a795775c9fc74cfa0b62cf9a11f312b87d53dee56a339c08dfc1fb770a0
                                                          • Instruction ID: 51f3b0ed170682a5fe63536b5c9666f338cb21fd7fac9fe836569c064d4e7372
                                                          • Opcode Fuzzy Hash: 99115a795775c9fc74cfa0b62cf9a11f312b87d53dee56a339c08dfc1fb770a0
                                                          • Instruction Fuzzy Hash: A6E06531254744AADB215B74EC09BE83F10EB11375F049319F7F9A41E1C3724640DB21
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 00D01634
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00D011D9), ref: 00D0163B
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00D011D9), ref: 00D01648
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00D011D9), ref: 00D0164F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 0b7e5ab564a8984e0351e3a482787ed0442bd6bacfc226fb8971a64c416e7bb9
                                                          • Instruction ID: 7b8fc1c1c8602545a25564c9920689b00ca609e522f88515d01a987679d71fa4
                                                          • Opcode Fuzzy Hash: 0b7e5ab564a8984e0351e3a482787ed0442bd6bacfc226fb8971a64c416e7bb9
                                                          • Instruction Fuzzy Hash: B8E08C36612311EBD7301FA0AE0DB873B7CAF44792F188808F249E9080E7348444CB74
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 00CFD858
                                                          • GetDC.USER32(00000000), ref: 00CFD862
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00CFD882
                                                          • ReleaseDC.USER32(?), ref: 00CFD8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 0ad12e34c14c58922ae02c7b970ea77c06a5b2da40cb010ff55343ace5f4b10a
                                                          • Instruction ID: 277a280f43b3b21ebd874f32cbeb362800718645effb782d4908eeeadf373eea
                                                          • Opcode Fuzzy Hash: 0ad12e34c14c58922ae02c7b970ea77c06a5b2da40cb010ff55343ace5f4b10a
                                                          • Instruction Fuzzy Hash: DCE01AB1810305DFCB41AFA1D84D66DBBB2FB08310F109009F846F7360D7388901AF60
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 00CFD86C
                                                          • GetDC.USER32(00000000), ref: 00CFD876
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00CFD882
                                                          • ReleaseDC.USER32(?), ref: 00CFD8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 3ae09b8265559444941ff7070d662719112ada7c6980c8599a70e348aeedcf05
                                                          • Instruction ID: 0d34a8d7be79c6598d4450e52170f660835ba03f1741a622ab10595385112e69
                                                          • Opcode Fuzzy Hash: 3ae09b8265559444941ff7070d662719112ada7c6980c8599a70e348aeedcf05
                                                          • Instruction Fuzzy Hash: 45E012B1810304EFCB40AFA0D84D66DBBB1BB08310F10A008F84AF7360DB389901AF60
                                                          APIs
                                                            • Part of subcall function 00CA7620: _wcslen.LIBCMT ref: 00CA7625
                                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00D14ED4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Connection_wcslen
                                                          • String ID: *$LPT
                                                          • API String ID: 1725874428-3443410124
                                                          • Opcode ID: 973d4b2d496a5e685e61b54e099b8f1662a030fe18b53b556dfc63a3c0257d88
                                                          • Instruction ID: d23c2c9ecd1ef3002fc0483317c62d0cf95c1b77b26bf644f0360bd7d42d0d17
                                                          • Opcode Fuzzy Hash: 973d4b2d496a5e685e61b54e099b8f1662a030fe18b53b556dfc63a3c0257d88
                                                          • Instruction Fuzzy Hash: 63915175A00205AFCB14DF58D484EEABBF1BF45308F198099E4459F352DB35ED86CB60
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 00CCE30D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__start
                                                          • String ID: pow
                                                          • API String ID: 3213639722-2276729525
                                                          • Opcode ID: 043009a4813db92cc64d7793e719c56cb527b1ae7c1005633e97801a9ecf295d
                                                          • Instruction ID: 924bdefaf34d657871346e78faa073d176ff832918a35d0f89ffc17dd8b69e08
                                                          • Opcode Fuzzy Hash: 043009a4813db92cc64d7793e719c56cb527b1ae7c1005633e97801a9ecf295d
                                                          • Instruction Fuzzy Hash: 7A515C61A0C3029ACB157B14C901B7A3BA4AF42740F744E9EF5E5823F9FB348D95AA46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #
                                                          • API String ID: 0-1885708031
                                                          • Opcode ID: 54330777d9d696ae9c3f6555ee07e1950a6e992eabbcec26d1619e56307b1086
                                                          • Instruction ID: 612820167b9c31bc5b9d03414d6ebdae3445f6078f47cba7bec5eeb86c202f07
                                                          • Opcode Fuzzy Hash: 54330777d9d696ae9c3f6555ee07e1950a6e992eabbcec26d1619e56307b1086
                                                          • Instruction Fuzzy Hash: 5751593550434ADFDB15EF68C081AFA7BA4EF16710F244066FD619B2E0D7349E42DBA2
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 00CBF2A2
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00CBF2BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: f909c854986455cf5ca09f9424480250b631ad3daf1bf8ed665fed04b3698a00
                                                          • Instruction ID: e2d1cbc1bb6b6581b1653929f96de6dd6480934e84ede9c5e8a52f61f4898f5b
                                                          • Opcode Fuzzy Hash: f909c854986455cf5ca09f9424480250b631ad3daf1bf8ed665fed04b3698a00
                                                          • Instruction Fuzzy Hash: 445134724087499FD320AF54DC86BABBBF8FB85304F81885DF199811A5EB708529CB66
                                                          APIs
                                                          • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00D029EB
                                                          • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00D02A8D
                                                            • Part of subcall function 00D02C75: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00D02CE0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 3850602802-2594219639
                                                          • Opcode ID: 187809f6f6bdcc1d2873542d3f852332c469c73bc05265c08363b399ec4f0ca7
                                                          • Instruction ID: 8d273e916ead6b60a7955c5caeb692efcc530105d3a1305411ba7c80c275ef39
                                                          • Opcode Fuzzy Hash: 187809f6f6bdcc1d2873542d3f852332c469c73bc05265c08363b399ec4f0ca7
                                                          • Instruction Fuzzy Hash: C3419130A01209ABDF25DF54C84ABFE7BB9EF45714F080029F909A32D1DB709A45DBB1
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00D257E0
                                                          • _wcslen.LIBCMT ref: 00D257EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper_wcslen
                                                          • String ID: CALLARGARRAY
                                                          • API String ID: 157775604-1150593374
                                                          • Opcode ID: 0783617a5925859681a0dd02ffbc52a4f75ab2e04bab1217b4e27f75223a512d
                                                          • Instruction ID: e4de321e68d12cc4717815a2207614e6bdb2a89b2519fa7b17fc277d8c643822
                                                          • Opcode Fuzzy Hash: 0783617a5925859681a0dd02ffbc52a4f75ab2e04bab1217b4e27f75223a512d
                                                          • Instruction Fuzzy Hash: D141A131A001199FCB04DFA8E881DAEFBB5FF69318F144029E505A7295D770DD81DBA0
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00D1D130
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00D1D13A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_wcslen
                                                          • String ID: |
                                                          • API String ID: 596671847-2343686810
                                                          • Opcode ID: 768de2e701f369b616a4a68d7673ef23b5d7dc4efaacc3f44ff3616bccf1d57d
                                                          • Instruction ID: 6218b5b6783c23dcccf9751c709389e479265025691869224ce40ec7effab1d2
                                                          • Opcode Fuzzy Hash: 768de2e701f369b616a4a68d7673ef23b5d7dc4efaacc3f44ff3616bccf1d57d
                                                          • Instruction Fuzzy Hash: 21311971D00219BBCF15EFE4DC85AEEBFBAFF05304F040019E815A6166DB35AA46DB60
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00D33621
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00D3365C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 599b13124aeff6dcdaafcb46492999a3f9f1cabaa6fc9598dc5c1ecbe83e9a55
                                                          • Instruction ID: 1cef76c26efa56ae50b742cc477caf4f4f7b7448adb5408c99d54fc0f0708fbf
                                                          • Opcode Fuzzy Hash: 599b13124aeff6dcdaafcb46492999a3f9f1cabaa6fc9598dc5c1ecbe83e9a55
                                                          • Instruction Fuzzy Hash: A9319A72110204AEDB209F68DC81EFB73A9FF88764F149619F8A5D7290DA30ED91DB70
                                                          APIs
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00D3461F
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00D34634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 21be11103693d6397f0957937303ca494949176b6705a4c6ab20af3f277c685f
                                                          • Instruction ID: 7ba6ffa81d72a3ddfec19cbbac4027bbb4b3dc8f20bbb2f72f495fd593a3d120
                                                          • Opcode Fuzzy Hash: 21be11103693d6397f0957937303ca494949176b6705a4c6ab20af3f277c685f
                                                          • Instruction Fuzzy Hash: 8D312575A0130A9FDB14CFA9C981BDABBB5FF09300F14406AE904AB391E774E941CFA0
                                                          APIs
                                                          • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00D02884
                                                          • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00D028B6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 3850602802-2594219639
                                                          • Opcode ID: 974498594fff3ca5f8b7a216c3bff4bb9b33b16ffd553a264ffaa86630c4222b
                                                          • Instruction ID: e5c57af28f16595742fd9df203b33f77bf29f983c58f5e269f2cf8883e448594
                                                          • Opcode Fuzzy Hash: 974498594fff3ca5f8b7a216c3bff4bb9b33b16ffd553a264ffaa86630c4222b
                                                          • Instruction Fuzzy Hash: 97214936E00215ABCB15AF94D885EBFB7B9EF89714F044019F909B72D0EA709C41CBB0
                                                          APIs
                                                            • Part of subcall function 00D03D03: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00D03D18
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00D03C23
                                                          • _strlen.LIBCMT ref: 00D03C2E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Timeout_strlen
                                                          • String ID: @U=u
                                                          • API String ID: 2777139624-2594219639
                                                          • Opcode ID: deb9bd6511ffca6b522f40825a4b4c5960e1b834b7b89a33f63058475d9282fc
                                                          • Instruction ID: 773b1abed415cfd2a8781398939277b9860e866f0c4d5fa5e49194979e705718
                                                          • Opcode Fuzzy Hash: deb9bd6511ffca6b522f40825a4b4c5960e1b834b7b89a33f63058475d9282fc
                                                          • Instruction Fuzzy Hash: CF11DA3270011527DB296E78D892ABE776C8F56B44F14003DF94AEB2D2DE20DE4297F8
                                                          APIs
                                                            • Part of subcall function 00D0ED19: GetLocalTime.KERNEL32 ref: 00D0ED2A
                                                            • Part of subcall function 00D0ED19: _wcslen.LIBCMT ref: 00D0ED3B
                                                            • Part of subcall function 00D0ED19: _wcslen.LIBCMT ref: 00D0ED79
                                                            • Part of subcall function 00D0ED19: _wcslen.LIBCMT ref: 00D0EDAF
                                                            • Part of subcall function 00D0ED19: _wcslen.LIBCMT ref: 00D0EDDF
                                                            • Part of subcall function 00D0ED19: _wcslen.LIBCMT ref: 00D0EDEF
                                                            • Part of subcall function 00D0ED19: _wcslen.LIBCMT ref: 00D0EE2B
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00D3340A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$LocalMessageSendTime
                                                          • String ID: @U=u$SysDateTimePick32
                                                          • API String ID: 2216836867-2530228043
                                                          • Opcode ID: eb58b56945ac5a1af8e08715b1d479619efa3c273afe89ecd5750f95d81b1045
                                                          • Instruction ID: fb17857aeb08bd4a3acb485390e08b35ea7986b26ccee22f90287236a2d8d85c
                                                          • Opcode Fuzzy Hash: eb58b56945ac5a1af8e08715b1d479619efa3c273afe89ecd5750f95d81b1045
                                                          • Instruction Fuzzy Hash: 332103323502096FEF229E54DC82FEE33AAEB44754F244519F940EB1D0DAB5EC8087B0
                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D02178
                                                            • Part of subcall function 00D0B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00D0B355
                                                            • Part of subcall function 00D0B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00D02194,00000034,?,?,00001004,00000000,00000000), ref: 00D0B365
                                                            • Part of subcall function 00D0B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00D02194,00000034,?,?,00001004,00000000,00000000), ref: 00D0B37B
                                                            • Part of subcall function 00D0B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D021D0,?,?,00000034,00000800,?,00000034), ref: 00D0B42D
                                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00D021DF
                                                            • Part of subcall function 00D0B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00D0B3F8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Process$MemoryMessageSend$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @U=u
                                                          • API String ID: 1045663743-2594219639
                                                          • Opcode ID: 8b345f6150f31e803c3542a0a62d5144f984a26732a1490bce1680d1f00ae8e1
                                                          • Instruction ID: 740c8fd0af1add182e0fe64e4715295d2bc7c3b13a8bb1aade63609e450879fe
                                                          • Opcode Fuzzy Hash: 8b345f6150f31e803c3542a0a62d5144f984a26732a1490bce1680d1f00ae8e1
                                                          • Instruction Fuzzy Hash: 5E215C31902229ABEF15ABA8DC45FEDBBB8FF08354F1001A6E548A61D0EA705A44DB64
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00D3327C
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D33287
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 54241be1e0c340c22dd320259f3a1c341b625db206acfbe20eb58f1030204191
                                                          • Instruction ID: cdb64d383a8ac77db60958c81e7c06029cd3f6171ed9fe2f6629da51181c8d07
                                                          • Opcode Fuzzy Hash: 54241be1e0c340c22dd320259f3a1c341b625db206acfbe20eb58f1030204191
                                                          • Instruction Fuzzy Hash: E711E2753002087FEF219F54DD81EBB376AEB943A4F140228F918DB290D6319D618770
                                                          APIs
                                                            • Part of subcall function 00CA600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00CA604C
                                                            • Part of subcall function 00CA600E: GetStockObject.GDI32(00000011), ref: 00CA6060
                                                            • Part of subcall function 00CA600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00CA606A
                                                          • GetWindowRect.USER32(00000000,?), ref: 00D3377A
                                                          • GetSysColor.USER32(00000012), ref: 00D33794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 6afa73490b0f6e7fe2759abc18eab60b28c3b853b7185c8be4e0e13ff0fe7a18
                                                          • Instruction ID: 3f1c512968133706c21444c71cec612f36b6c7b465f68b1b42b7baf413a7b68b
                                                          • Opcode Fuzzy Hash: 6afa73490b0f6e7fe2759abc18eab60b28c3b853b7185c8be4e0e13ff0fe7a18
                                                          • Instruction Fuzzy Hash: 901137B261020AAFDF00DFA8CD46EFA7BB8FB08354F045914F955E2250E775E861DB60
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00D361FC
                                                          • SendMessageW.USER32(?,00000194,00000000,00000000), ref: 00D36225
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 3850602802-2594219639
                                                          • Opcode ID: a8ae18ae7227533b0054185bb41b88747bedb4b6989ff4aa4a00029590efd00d
                                                          • Instruction ID: 762e6d7147d0006a1a2af923af26d39c8cfc7cbdf407ca5e0a39a7b31daaa6f6
                                                          • Opcode Fuzzy Hash: a8ae18ae7227533b0054185bb41b88747bedb4b6989ff4aa4a00029590efd00d
                                                          • Instruction Fuzzy Hash: 9211BF39140214BFEB108F68DC1AFBB3BA4EB0A714F558115FA56EA1E1D3B0DA00DB78
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00D1CD7D
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00D1CDA6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 33f24b611ed72f4d3606d8ff525e1411b4655ccef08b984f823c3d73b0e84a57
                                                          • Instruction ID: c47936c6f93446e113ff99edb601ac8b2b38f5ce52851bb97e4c250328d0c387
                                                          • Opcode Fuzzy Hash: 33f24b611ed72f4d3606d8ff525e1411b4655ccef08b984f823c3d73b0e84a57
                                                          • Instruction Fuzzy Hash: 8E11C6B12A56317AD7344B66BC45EE7BE6CEF127A4F005226B549D3180DB709881D6F0
                                                          APIs
                                                          • SendMessageW.USER32(?,?,?,?), ref: 00D34FCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 3850602802-2594219639
                                                          • Opcode ID: 0b153d3bc1dd1c6c0f985050f46c996ff037f909c04ca189aeb137ba1115e2d2
                                                          • Instruction ID: b692cad3f6ca04fbfd337412e0df9c6ccfffc73ef9cf191fa525af78e53ed750
                                                          • Opcode Fuzzy Hash: 0b153d3bc1dd1c6c0f985050f46c996ff037f909c04ca189aeb137ba1115e2d2
                                                          • Instruction Fuzzy Hash: F221D37A61021AEFCB15CFA8D9408EA7BB5FF4D344B044154FA05A7324D732EA21EBA0
                                                          APIs
                                                          • SendMessageW.USER32(?,00000401,?,00000000), ref: 00D33147
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @U=u$button
                                                          • API String ID: 3850602802-1762282863
                                                          • Opcode ID: e03ca9ccce4c21295087264a9592de051caa7d65ffd75032b6ae859492de6dfc
                                                          • Instruction ID: 38b70ae921121e0abbf5d23d91d478d7bad347dcdaa5719871ce3f0b5ee517d1
                                                          • Opcode Fuzzy Hash: e03ca9ccce4c21295087264a9592de051caa7d65ffd75032b6ae859492de6dfc
                                                          • Instruction Fuzzy Hash: EC11A132250309ABDF118F64DC41FEA3B6AEB08354F140214FE54A7190C776E8A1AB70
                                                          APIs
                                                            • Part of subcall function 00CA9CB3: _wcslen.LIBCMT ref: 00CA9CBD
                                                          • CharUpperBuffW.USER32(?,?,?), ref: 00D06CB6
                                                          • _wcslen.LIBCMT ref: 00D06CC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: STOP
                                                          • API String ID: 1256254125-2411985666
                                                          • Opcode ID: 202e11ac6a510f914dbb24c4b5efa62b7c54acda562c70f929e69f9c75d4f76b
                                                          • Instruction ID: 5046c9626966f31829b48e0c3008aef2515cf9be671c859b9e71d7fc23eb1460
                                                          • Opcode Fuzzy Hash: 202e11ac6a510f914dbb24c4b5efa62b7c54acda562c70f929e69f9c75d4f76b
                                                          • Instruction Fuzzy Hash: 8A012232A005278BDB20AFBDDC81BBF3BB4EF61714B040528E866972D0EB31D860C670
                                                          APIs
                                                            • Part of subcall function 00D0B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D021D0,?,?,00000034,00000800,?,00000034), ref: 00D0B42D
                                                          • SendMessageW.USER32(?,0000102B,?,00000000), ref: 00D0243B
                                                          • SendMessageW.USER32(?,0000102B,?,00000000), ref: 00D0245E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MemoryProcessWrite
                                                          • String ID: @U=u
                                                          • API String ID: 1195347164-2594219639
                                                          • Opcode ID: 3317536b7609b9a943f385b285486a33bdd5576476b7850b3b3b46444fbf4d78
                                                          • Instruction ID: 9983dc95414d1c18c047fdabcd73d446043c5ae8236fb4cbe0235b0a3410451f
                                                          • Opcode Fuzzy Hash: 3317536b7609b9a943f385b285486a33bdd5576476b7850b3b3b46444fbf4d78
                                                          • Instruction Fuzzy Hash: A701F932900218ABEB116F64DC4AFFEBB78DB14324F10402AF559B61D1DB709E44CB70
                                                          APIs
                                                          • SendMessageW.USER32(?,0000133E,00000000,?), ref: 00D343AF
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?), ref: 00D34408
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: InvalidateMessageRectSend
                                                          • String ID: @U=u
                                                          • API String ID: 909852535-2594219639
                                                          • Opcode ID: 37d7359153ef8185f54eb26b9ff602b2bccf105be5b5c956b1984df5b75a7d8c
                                                          • Instruction ID: f2a0c816c02f657460dc353dc0b73b56838fd89401fb3dec5ce0720cb5e30e97
                                                          • Opcode Fuzzy Hash: 37d7359153ef8185f54eb26b9ff602b2bccf105be5b5c956b1984df5b75a7d8c
                                                          • Instruction Fuzzy Hash: 6B11BC30500744AFE721CF24C891BEBBBE4BF06310F14891CE8AB97291CB71B941DB60
                                                          APIs
                                                          • SendMessageW.USER32(?,00000406,00000000,00000000), ref: 00D02531
                                                          • SendMessageW.USER32(?,0000040D,?,00000000), ref: 00D02564
                                                            • Part of subcall function 00D0B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00D0B3F8
                                                            • Part of subcall function 00CA6B57: _wcslen.LIBCMT ref: 00CA6B6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MemoryProcessRead_wcslen
                                                          • String ID: @U=u
                                                          • API String ID: 1083363909-2594219639
                                                          • Opcode ID: 61b6baff0c82a90a2a6a09ee2fa683fdb388154400eca1506568c0c4c750dd6e
                                                          • Instruction ID: 96757ff42e9ee37d4cd6f9d0d1c0bf9588c55abd30a9cc08969d2cc6d2cd4591
                                                          • Opcode Fuzzy Hash: 61b6baff0c82a90a2a6a09ee2fa683fdb388154400eca1506568c0c4c750dd6e
                                                          • Instruction Fuzzy Hash: 29016D71901118AFDB50AF90DC95EED77ACEB14344F80D0A6F649A6190DE305E88DBA0
                                                          APIs
                                                            • Part of subcall function 00CB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00CB9BB2
                                                          • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,00CF769C,?,?,?), ref: 00D39111
                                                            • Part of subcall function 00CB9944: GetWindowLongW.USER32(?,000000EB), ref: 00CB9952
                                                          • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00D390F7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageProcSend
                                                          • String ID: @U=u
                                                          • API String ID: 982171247-2594219639
                                                          • Opcode ID: d60793fec9166a7e312d32adba02c80590031bd4f0ca8f3dd110c621244547c0
                                                          • Instruction ID: 874dd13083fbb24eea07d862c79522c2b6e3b901080c42df285c93221e65c691
                                                          • Opcode Fuzzy Hash: d60793fec9166a7e312d32adba02c80590031bd4f0ca8f3dd110c621244547c0
                                                          • Instruction Fuzzy Hash: 2C01B135100304ABDB219F18DC59EA67BA6EB85365F140118FA556B3E1C7B26841DB70
                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D02480
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D02497
                                                            • Part of subcall function 00D023DB: SendMessageW.USER32(?,0000102B,?,00000000), ref: 00D0243B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 3850602802-2594219639
                                                          • Opcode ID: 12cd94fb70235643f2ba460e9079b8630922f8a78c498db93cf4705d313f6f1d
                                                          • Instruction ID: 5783b387bb63643b17b7bfc8e24c6e6be83d9c2b83f1aa2bd79cdee05d6c9954
                                                          • Opcode Fuzzy Hash: 12cd94fb70235643f2ba460e9079b8630922f8a78c498db93cf4705d313f6f1d
                                                          • Instruction Fuzzy Hash: A6F0E230602121BBEB211B16DC0FDEFBF6DDF56760B100014F409E21A1C6A19D41C7B0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: 3, 3, 16, 1
                                                          • API String ID: 176396367-3042988571
                                                          • Opcode ID: 9919a41b3de19afba31e62a804d2710c24c17259c8915673f3ca82edc1bbf1d8
                                                          • Instruction ID: 1a047bf6fb8894682a43e2d390f5201abb051282355e0c97b9187f84e8f15203
                                                          • Opcode Fuzzy Hash: 9919a41b3de19afba31e62a804d2710c24c17259c8915673f3ca82edc1bbf1d8
                                                          • Instruction Fuzzy Hash: F5E02B026042301092353279FCC1EBF568DCFD6754714182FF981C2266EAA4CD93A3B0
                                                          APIs
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D02BFA
                                                          • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00D02C2A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 3850602802-2594219639
                                                          • Opcode ID: af284bcb419f1abe5e2743ec2ce851d3b55f5486a35c34e429d5f009e3587bb9
                                                          • Instruction ID: 645eae3478ac9f78595e39841d74c857fcfb737c9ae6f94a7da96d89a4f44421
                                                          • Opcode Fuzzy Hash: af284bcb419f1abe5e2743ec2ce851d3b55f5486a35c34e429d5f009e3587bb9
                                                          • Instruction Fuzzy Hash: 62F0A076340304BFFA116B84EC8BFBA3B58EB14761F001014F7496A1E0C9E25C0097B0
                                                          APIs
                                                            • Part of subcall function 00D0286B: SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00D02884
                                                            • Part of subcall function 00D0286B: SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00D028B6
                                                          • SendMessageW.USER32(?,0000110B,00000005,00000000), ref: 00D02D80
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00D02D90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 3850602802-2594219639
                                                          • Opcode ID: d2122fec629812922bc4bf68a303e2b59b9a88af7e30110c68c81998f045c435
                                                          • Instruction ID: d88ae010e888131ae419ebf8fdd29a80ac934f997131d5b6bf42304ce31d8910
                                                          • Opcode Fuzzy Hash: d2122fec629812922bc4bf68a303e2b59b9a88af7e30110c68c81998f045c435
                                                          • Instruction Fuzzy Hash: F2E092392443057BF6210A519C4EFB3375CD758755F101026F208A51E1DAE2CC105670
                                                          APIs
                                                          • SendMessageW.USER32(?,0000133D,?,?), ref: 00D35855
                                                          • InvalidateRect.USER32(?,?,00000001), ref: 00D35877
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: InvalidateMessageRectSend
                                                          • String ID: @U=u
                                                          • API String ID: 909852535-2594219639
                                                          • Opcode ID: 192fc87683aa0b04c6cad64f1bbbb887d2caa4634a2c26e75eb663162dc1e6f1
                                                          • Instruction ID: 9cc5f4373bbe2f1ebc712d0e0fb00baf61a52279a33f0d08b97a5724dea331a9
                                                          • Opcode Fuzzy Hash: 192fc87683aa0b04c6cad64f1bbbb887d2caa4634a2c26e75eb663162dc1e6f1
                                                          • Instruction Fuzzy Hash: 26F08272604140AFDB20CB65EC45FEEBBF8EB86321F0441B2E55AE9165D6308A91CF30
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00D00B23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 2030045667-4017498283
                                                          • Opcode ID: 0abd4e3c6c537c6f4b21043d3c83b3cc355edd353e12273b768bb8bc2746aba7
                                                          • Instruction ID: 5cebbeda0eefabdb72e7b50456d4ea0c2d1b5d535933b810f8b6b6b2dbdb3992
                                                          • Opcode Fuzzy Hash: 0abd4e3c6c537c6f4b21043d3c83b3cc355edd353e12273b768bb8bc2746aba7
                                                          • Instruction Fuzzy Hash: 53E0DF322943183AD2143794BC03FC97A848F05B61F10042EFB98A56C38AE264902BB9
                                                          APIs
                                                            • Part of subcall function 00CBF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00CC0D71,?,?,?,00CA100A), ref: 00CBF7CE
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,00CA100A), ref: 00CC0D75
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00CA100A), ref: 00CC0D84
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00CC0D7F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 55579361-631824599
                                                          • Opcode ID: fd52611ed9ffd2189174ac1855d200638a2efc8b035c7b9021c1e9738d2a91cd
                                                          • Instruction ID: 6469c54dd53a937c9d3a5914ee781518d5cf5d5ffaa3fe8551d0e49d3cf2cec4
                                                          • Opcode Fuzzy Hash: fd52611ed9ffd2189174ac1855d200638a2efc8b035c7b9021c1e9738d2a91cd
                                                          • Instruction Fuzzy Hash: 00E06D742007118BD3209FB8D8087427BE0AB00744F104A6DE886D6751DBB4E4848BA1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: LocalTime
                                                          • String ID: %.3d$X64
                                                          • API String ID: 481472006-1077770165
                                                          • Opcode ID: 47566c175de3756d3829ac0cce003d28584e62ea2f8d81dbab2da113b2cfa1d0
                                                          • Instruction ID: b5832b0183d19afbb4bbcf4772c6bc3bc00edb8d8e6f7df8de5274ede666ada4
                                                          • Opcode Fuzzy Hash: 47566c175de3756d3829ac0cce003d28584e62ea2f8d81dbab2da113b2cfa1d0
                                                          • Instruction Fuzzy Hash: 80D012A180810CEACBD097D2DC458FAB37DAB18301F508452FA07E1140E624C90867A3
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00D3236C
                                                          • PostMessageW.USER32(00000000), ref: 00D32373
                                                            • Part of subcall function 00D0E97B: Sleep.KERNEL32 ref: 00D0E9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 8fed50e796ee3a5ae519efbd102c6e9fd11a5d23cb9fc7a52532c72748717051
                                                          • Instruction ID: 400ecca2a56c477a1bdb346ccf986838beb86c932390a8d06c149f2e48b50d13
                                                          • Opcode Fuzzy Hash: 8fed50e796ee3a5ae519efbd102c6e9fd11a5d23cb9fc7a52532c72748717051
                                                          • Instruction Fuzzy Hash: F4D0C9323913107BE664A770AC0FFC676149B05B10F1059167645FA2E0C9A0A8058B74
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00D3232C
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00D3233F
                                                            • Part of subcall function 00D0E97B: Sleep.KERNEL32 ref: 00D0E9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 073d4945b70a41aa7da866c418609e28697394de21e4e3e277e5eb463dab5db7
                                                          • Instruction ID: c738f89cd80bfd3dc83ef20b62d93f8361cac4145089b47b2c57e12c84f36fd6
                                                          • Opcode Fuzzy Hash: 073d4945b70a41aa7da866c418609e28697394de21e4e3e277e5eb463dab5db7
                                                          • Instruction Fuzzy Hash: 41D012363A4310BBE664B770EC0FFC67A149B00B10F1059167749FA2E0C9F0A805CB74
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00D0231F
                                                          • SendMessageW.USER32(00000000,00001200,00000000,00000000), ref: 00D0232D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1460242936.0000000000CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CA0000, based on PE: true
                                                          • Associated: 00000000.00000002.1460228029.0000000000CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460316546.0000000000D62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460434032.0000000000D6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1460475291.0000000000D74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ca0000_8f5WsFcnTc.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: @U=u
                                                          • API String ID: 3850602802-2594219639
                                                          • Opcode ID: c1330916563c9eae40737719fb135f86cbca92f5620445e9f1c9103e5b51b5f4
                                                          • Instruction ID: c6f541e2a8512db9d9afaff8c129fc78bf434eabe71edf500b260df9a3c6b2bb
                                                          • Opcode Fuzzy Hash: c1330916563c9eae40737719fb135f86cbca92f5620445e9f1c9103e5b51b5f4
                                                          • Instruction Fuzzy Hash: B9C00231150280BBE6211B67AD0ED573E3DE7DAF517102158B215E51B586650055D634