Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0wxckB4Iba.exe

Overview

General Information

Sample name:0wxckB4Iba.exe
renamed because original name is a hash value
Original sample name:b42c4f2e9db240e5bb32ecc0d46793b4a343749d7972a6d698354316b695e24f.exe
Analysis ID:1569280
MD5:dd7a345d9054fa43a8ef12c5b037c037
SHA1:7de32f230eed1e670e4701ecc3e47350cc17c1b9
SHA256:b42c4f2e9db240e5bb32ecc0d46793b4a343749d7972a6d698354316b695e24f
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 0wxckB4Iba.exe (PID: 7088 cmdline: "C:\Users\user\Desktop\0wxckB4Iba.exe" MD5: DD7A345D9054FA43A8EF12C5B037C037)
    • RegSvcs.exe (PID: 6344 cmdline: "C:\Users\user\Desktop\0wxckB4Iba.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • 0wxckB4Iba.exe (PID: 3760 cmdline: "C:\Users\user\Desktop\0wxckB4Iba.exe" MD5: DD7A345D9054FA43A8EF12C5B037C037)
      • RegSvcs.exe (PID: 1988 cmdline: "C:\Users\user\Desktop\0wxckB4Iba.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://beirutrest.com", "Username": "belogs@beirutrest.com", "Password": "9yXQ39wz(uL+"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3864240019.000000000311F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.3861070576.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x1300:$s3: 83 EC 38 53 B0 DE 88 44 24 2B 88 44 24 2F B0 EB 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1fdd0:$s5: delete[]
    • 0x1f288:$s6: constructor or from DllMain.
    00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          Click to see the 19 entries
          SourceRuleDescriptionAuthorStrings
          4.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 DE 88 44 24 2B 88 44 24 2F B0 EB 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          4.2.RegSvcs.exe.2d2fb86.2.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            4.2.RegSvcs.exe.2d2fb86.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              4.2.RegSvcs.exe.2d2fb86.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                4.2.RegSvcs.exe.2d2fb86.2.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x3ee8f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x3ef01:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3ef8b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x3f01d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3f087:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3f0f9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3f18f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x3f21f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                Click to see the 79 entries
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0wxckB4Iba.exeAvira: detected
                Source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://beirutrest.com", "Username": "belogs@beirutrest.com", "Password": "9yXQ39wz(uL+"}
                Source: 0wxckB4Iba.exeReversingLabs: Detection: 68%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 0wxckB4Iba.exeJoe Sandbox ML: detected
                Source: 0wxckB4Iba.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.8:49706 version: TLS 1.2
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: 0wxckB4Iba.exe, 00000000.00000003.1422195823.0000000004610000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000000.00000003.1422453875.0000000004470000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000003.00000003.1457007978.0000000004690000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000003.00000003.1457310786.00000000044F0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 0wxckB4Iba.exe, 00000000.00000003.1422195823.0000000004610000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000000.00000003.1422453875.0000000004470000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000003.00000003.1457007978.0000000004690000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000003.00000003.1457310786.00000000044F0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,3_2_00452126
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,3_2_0045C999
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,3_2_00436ADE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00434BEE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0045DD7C FindFirstFileW,FindClose,3_2_0045DD7C
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,3_2_0044BD29
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,3_2_00436D2D
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00442E1F
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,3_2_00475FE5
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_0044BF8D
                Source: Joe Sandbox ViewIP Address: 50.87.144.157 50.87.144.157
                Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0044289D InternetQueryDataAvailable,InternetReadFile,0_2_0044289D
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                Source: global trafficDNS traffic detected: DNS query: beirutrest.com
                Source: RegSvcs.exe, 00000004.00000002.3864240019.000000000311F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://beirutrest.com
                Source: RegSvcs.exe, 00000004.00000002.3866479524.0000000005790000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.co
                Source: RegSvcs.exe, 00000004.00000002.3864240019.00000000030A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: RegSvcs.exe, 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3864240019.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: RegSvcs.exe, 00000004.00000002.3864240019.00000000030A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: RegSvcs.exe, 00000004.00000002.3864240019.00000000030A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.8:49706 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, n00.cs.Net Code: lGCzgIzdr
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046C5D0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00459FFF
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,3_2_00459FFF
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046C5D0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00456354 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,0_2_00456354
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C08E
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,3_2_0047C08E

                System Summary

                barindex
                Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5800000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5800000.8.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40f2990.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40f2990.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5530000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5530000.7.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.2d2fb86.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.2d2fb86.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40a6458.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40a6458.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40a5570.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40a5570.5.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5530ee8.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5530ee8.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5530000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.5530000.7.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40a6458.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40a6458.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 4.2.RegSvcs.exe.2d2ec9e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.2d2ec9e.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40a5570.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40a5570.5.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 4.2.RegSvcs.exe.2d2ec9e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.2d2ec9e.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.0wxckB4Iba.exe.2fc0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40f2990.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 4.2.RegSvcs.exe.40f2990.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.0wxckB4Iba.exe.3b40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000004.00000002.3861070576.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000000.00000002.1423973126.0000000003B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 00000003.00000002.1458451104.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00434D50: GetFullPathNameW,__swprintf,_wcslen,_wcslen,_wcslen,CreateDirectoryW,CreateFileW,_memset,_wcslen,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00434D50
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004461ED _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_004461ED
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,3_2_004364AA
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00409A400_2_00409A40
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004120380_2_00412038
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004271610_2_00427161
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0047E1FA0_2_0047E1FA
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004212BE0_2_004212BE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004433900_2_00443390
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004433910_2_00443391
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0041A46B0_2_0041A46B
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0041240C0_2_0041240C
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004465660_2_00446566
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004045E00_2_004045E0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0041D7500_2_0041D750
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004037E00_2_004037E0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004278590_2_00427859
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004128180_2_00412818
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0040F8900_2_0040F890
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0042397B0_2_0042397B
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00411B630_2_00411B63
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0047CBF00_2_0047CBF0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0044EBBC0_2_0044EBBC
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00412C380_2_00412C38
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0044ED9A0_2_0044ED9A
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00423EBF0_2_00423EBF
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00424F700_2_00424F70
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0041AF0D0_2_0041AF0D
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_03FBF7980_2_03FBF798
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00409A403_2_00409A40
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004120383_2_00412038
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004271613_2_00427161
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0047E1FA3_2_0047E1FA
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004212BE3_2_004212BE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004433903_2_00443390
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004433913_2_00443391
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0041A46B3_2_0041A46B
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0041240C3_2_0041240C
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004465663_2_00446566
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004045E03_2_004045E0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0041D7503_2_0041D750
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004037E03_2_004037E0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004278593_2_00427859
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004128183_2_00412818
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0040F8903_2_0040F890
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0042397B3_2_0042397B
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00411B633_2_00411B63
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0047CBF03_2_0047CBF0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0044EBBC3_2_0044EBBC
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00412C383_2_00412C38
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0044ED9A3_2_0044ED9A
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00423EBF3_2_00423EBF
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00424F703_2_00424F70
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0041AF0D3_2_0041AF0D
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_03F7F7983_2_03F7F798
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00408C604_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040DC114_2_0040DC11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00407C3F4_2_00407C3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00418CCC4_2_00418CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00406CA04_2_00406CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004028B04_2_004028B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041A4BE4_2_0041A4BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004182444_2_00418244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004016504_2_00401650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402F204_2_00402F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004193C44_2_004193C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004187884_2_00418788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402F894_2_00402F89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402B904_2_00402B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004073A04_2_004073A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F5D7404_2_02F5D740
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F5CB284_2_02F5CB28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F512CA4_2_02F512CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F5CE704_2_02F5CE70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F50FD04_2_02F50FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F510304_2_02F51030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0670C7804_2_0670C780
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0670EA584_2_0670EA58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_067093184_2_06709318
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_067000404_2_06700040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_067000074_2_06700007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0670F19B4_2_0670F19B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06B252224_2_06B25222
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06B2A0D84_2_06B2A0D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06B200404_2_06B20040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06B261A84_2_06B261A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06B211304_2_06B21130
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: String function: 00425210 appears 58 times
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: String function: 00445975 appears 130 times
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: String function: 0041171A appears 74 times
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: String function: 0041832D appears 52 times
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: String function: 004136BC appears 36 times
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: String function: 004092C0 appears 50 times
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: String function: 0041718C appears 90 times
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: String function: 00401B70 appears 46 times
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: String function: 0040E6D0 appears 70 times
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: String function: 0043362D appears 38 times
                Source: 0wxckB4Iba.exe, 00000000.00000003.1422577285.000000000473D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0wxckB4Iba.exe
                Source: 0wxckB4Iba.exe, 00000000.00000002.1423973126.0000000003B40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename2ee75d06-d489-4537-90fc-92fe0f559436.exe4 vs 0wxckB4Iba.exe
                Source: 0wxckB4Iba.exe, 00000000.00000003.1422071186.0000000004593000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0wxckB4Iba.exe
                Source: 0wxckB4Iba.exe, 00000003.00000003.1457310786.0000000004613000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0wxckB4Iba.exe
                Source: 0wxckB4Iba.exe, 00000003.00000003.1455411937.00000000047BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0wxckB4Iba.exe
                Source: 0wxckB4Iba.exe, 00000003.00000002.1458451104.0000000002FC0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename2ee75d06-d489-4537-90fc-92fe0f559436.exe4 vs 0wxckB4Iba.exe
                Source: 0wxckB4Iba.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.5800000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.5800000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.40f2990.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.40f2990.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.5530000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.5530000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.2d2fb86.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.2d2fb86.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.40a6458.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.40a6458.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.40a5570.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.40a5570.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.5530ee8.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.5530ee8.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.5530000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.5530000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.40a6458.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.40a6458.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 4.2.RegSvcs.exe.2d2ec9e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.2d2ec9e.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.40a5570.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.40a5570.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.2d2ec9e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.2d2ec9e.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.0wxckB4Iba.exe.2fc0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 4.2.RegSvcs.exe.40f2990.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 4.2.RegSvcs.exe.40f2990.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.0wxckB4Iba.exe.3b40000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000004.00000002.3861070576.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000000.00000002.1423973126.0000000003B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 00000003.00000002.1458451104.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, NpXw3kw.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, NpXw3kw.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/1@2/2
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0044AF5C GetLastError,FormatMessageW,0_2_0044AF5C
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464422
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,3_2_00464422
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,3_2_004364AA
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0045D517 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D517
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0043701F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,__wcsicoll,CloseHandle,0_2_0043701F
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0047A999 OleInitialize,CLSIDFromProgID,CoCreateInstance,CoInitializeSecurity,_memset,_wcslen,_memset,CoCreateInstanceEx,CoSetProxyBlanket,0_2_0047A999
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0043614F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043614F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeFile created: C:\Users\user\AppData\Local\Temp\intersentimentalJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCommand line argument: Wu0_2_0040D7F0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCommand line argument: Wu3_2_0040D7F0
                Source: 0wxckB4Iba.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: 0wxckB4Iba.exeReversingLabs: Detection: 68%
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeFile read: C:\Users\user\Desktop\0wxckB4Iba.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\0wxckB4Iba.exe "C:\Users\user\Desktop\0wxckB4Iba.exe"
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\0wxckB4Iba.exe"
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeProcess created: C:\Users\user\Desktop\0wxckB4Iba.exe "C:\Users\user\Desktop\0wxckB4Iba.exe"
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\0wxckB4Iba.exe"
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\0wxckB4Iba.exe"Jump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeProcess created: C:\Users\user\Desktop\0wxckB4Iba.exe "C:\Users\user\Desktop\0wxckB4Iba.exe"Jump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\0wxckB4Iba.exe"Jump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: 0wxckB4Iba.exeStatic file information: File size 1260925 > 1048576
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: 0wxckB4Iba.exe, 00000000.00000003.1422195823.0000000004610000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000000.00000003.1422453875.0000000004470000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000003.00000003.1457007978.0000000004690000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000003.00000003.1457310786.00000000044F0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 0wxckB4Iba.exe, 00000000.00000003.1422195823.0000000004610000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000000.00000003.1422453875.0000000004470000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000003.00000003.1457007978.0000000004690000.00000004.00001000.00020000.00000000.sdmp, 0wxckB4Iba.exe, 00000003.00000003.1457310786.00000000044F0000.00000004.00001000.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 4.2.RegSvcs.exe.40a6458.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 4.2.RegSvcs.exe.40f2990.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
                Source: 0wxckB4Iba.exeStatic PE information: real checksum: 0xa2135 should be: 0x137880
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004171D1 push ecx; ret 0_2_004171E4
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004171D1 push ecx; ret 3_2_004171E4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C40C push cs; iretd 4_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00423149 push eax; ret 4_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C50E push cs; iretd 4_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004231C8 push eax; ret 4_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040E21D push ecx; ret 4_2_0040E230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C6BE push ebx; ret 4_2_0041C6BF
                Source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'K8KARPvsQVxWN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'K8KARPvsQVxWN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'K8KARPvsQVxWN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 4.2.RegSvcs.exe.40a6458.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'K8KARPvsQVxWN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 4.2.RegSvcs.exe.40f2990.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'K8KARPvsQVxWN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_004772DE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,3_2_004772DE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,3_2_004375B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004440780_2_00444078
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004440783_2_00444078
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeAPI/Special instruction interceptor: Address: 3FBF3BC
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeAPI/Special instruction interceptor: Address: 3F7F3BC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599113Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598873Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598546Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598436Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598327Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598218Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598100Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597999Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597124Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596796Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596468Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596249Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596140Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595920Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595800Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595620Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595499Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595389Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595276Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595169Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595058Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594843Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594624Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594515Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594406Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594296Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2159Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7681Jump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeAPI coverage: 3.2 %
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeAPI coverage: 3.1 %
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,3_2_00452126
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,3_2_0045C999
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,3_2_00436ADE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00434BEE
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0045DD7C FindFirstFileW,FindClose,3_2_0045DD7C
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,3_2_0044BD29
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,3_2_00436D2D
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00442E1F
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,3_2_00475FE5
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_0044BF8D
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599113Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598873Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598546Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598436Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598327Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598218Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598100Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597999Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597124Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596796Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596468Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596249Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596140Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595920Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595800Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595620Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595499Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595389Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595276Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595169Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595058Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594843Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594624Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594515Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594406Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594296Jump to behavior
                Source: RegSvcs.exe, 00000004.00000002.3866479524.0000000005763000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0045A259 BlockInput,0_2_0045A259
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_03FBF688 mov eax, dword ptr fs:[00000030h]0_2_03FBF688
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_03FBF628 mov eax, dword ptr fs:[00000030h]0_2_03FBF628
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_03FBDFB8 mov eax, dword ptr fs:[00000030h]0_2_03FBDFB8
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_03F7F688 mov eax, dword ptr fs:[00000030h]3_2_03F7F688
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_03F7F628 mov eax, dword ptr fs:[00000030h]3_2_03F7F628
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_03F7DFB8 mov eax, dword ptr fs:[00000030h]3_2_03F7DFB8
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00426DA1 CreateFileW,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00426DA1
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0042202E SetUnhandledExceptionFilter,0_2_0042202E
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004230F5
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00417D93
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00421FA7
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0042202E SetUnhandledExceptionFilter,3_2_0042202E
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004230F5
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00417D93
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00421FA7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040E61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00416F6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004123F1 SetUnhandledExceptionFilter,4_2_004123F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: E5C008Jump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0043916A LogonUserW,0_2_0043916A
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00436431 __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_00436431
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\0wxckB4Iba.exe"Jump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\0wxckB4Iba.exe"Jump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00445DD3 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00445DD3
                Source: 0wxckB4Iba.exeBinary or memory string: Shell_TrayWnd
                Source: 0wxckB4Iba.exeBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_00410D10 cpuid 0_2_00410D10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,4_2_00417A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004223BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004223BC
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004711D2 GetUserNameW,0_2_004711D2
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0042039F __invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,0_2_0042039F
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5800000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40f2990.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2fb86.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a6458.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a5570.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530ee8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a6458.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2ec9e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a5570.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2ec9e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40f2990.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3864240019.000000000311F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3864240019.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1988, type: MEMORYSTR
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5800000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40f2990.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2fb86.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a6458.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a5570.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530ee8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a6458.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2ec9e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a5570.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2ec9e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40f2990.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: 0wxckB4Iba.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 6, 0USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:cdeclwinapistdcallnonestrwstrintbooluintlongulongdwordshortushortwordbyteubytebooleanfloatdoubleptrhwndhandlelresultlparamwparamint64uint64int_ptruint_ptrlong_ptrulong_ptrdword_ptridispatch64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----
                Source: 0wxckB4Iba.exeBinary or memory string: WIN_XP
                Source: 0wxckB4Iba.exeBinary or memory string: WIN_XPe
                Source: 0wxckB4Iba.exeBinary or memory string: WIN_VISTA
                Source: 0wxckB4Iba.exeBinary or memory string: WIN_7
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5800000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40f2990.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2fb86.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a6458.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a5570.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530ee8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a6458.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2ec9e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a5570.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2ec9e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40f2990.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3864240019.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1988, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5800000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40f2990.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2fb86.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a6458.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a5570.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530ee8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a6458.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2ec9e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a5570.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2ec9e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40f2990.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3864240019.000000000311F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3864240019.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1988, type: MEMORYSTR
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2fb86.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5800000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5800000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40f2990.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530ee8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2fb86.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a6458.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a5570.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530ee8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.5530000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a6458.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2ec9e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40a5570.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.2d2ec9e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegSvcs.exe.40f2990.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_004741BB
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket,0_2_0046483C
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 0_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0047AD92
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket,3_2_004741BB
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket,3_2_0046483C
                Source: C:\Users\user\Desktop\0wxckB4Iba.exeCode function: 3_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,3_2_0047AD92
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                121
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol2
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts2
                Command and Scripting Interpreter
                Logon Script (Windows)2
                Valid Accounts
                2
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                Software Packing
                NTDS148
                System Information Discovery
                Distributed Component Object Model121
                Input Capture
                13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets341
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Valid Accounts
                Cached Domain Credentials121
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items121
                Virtualization/Sandbox Evasion
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1569280 Sample: 0wxckB4Iba.exe Startdate: 05/12/2024 Architecture: WINDOWS Score: 100 24 beirutrest.com 2->24 26 api.ipify.org 2->26 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus / Scanner detection for submitted sample 2->40 42 7 other signatures 2->42 8 0wxckB4Iba.exe 1 2->8         started        signatures3 process4 signatures5 44 Switches to a custom stack to bypass stack traces 8->44 46 Contains functionality to detect sleep reduction / modifications 8->46 11 0wxckB4Iba.exe 8->11         started        14 RegSvcs.exe 8->14         started        process6 signatures7 48 Writes to foreign memory regions 11->48 50 Maps a DLL or memory area into another process 11->50 16 RegSvcs.exe 15 2 11->16         started        52 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->52 process8 dnsIp9 20 beirutrest.com 50.87.144.157, 21, 49707 UNIFIEDLAYER-AS-1US United States 16->20 22 api.ipify.org 172.67.74.152, 443, 49706 CLOUDFLARENETUS United States 16->22 28 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->28 30 Tries to steal Mail credentials (via file / registry access) 16->30 32 Tries to harvest and steal ftp login credentials 16->32 34 Tries to harvest and steal browser information (history, passwords, etc) 16->34 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                0wxckB4Iba.exe68%ReversingLabsWin32.Trojan.AutoitInject
                0wxckB4Iba.exe100%AviraTR/AD.GenSteal.bnwvm
                0wxckB4Iba.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                beirutrest.com
                50.87.144.157
                truefalse
                  high
                  api.ipify.org
                  172.67.74.152
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.orgRegSvcs.exe, 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3864240019.00000000030A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmpfalse
                        high
                        https://account.dyn.com/RegSvcs.exe, 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          https://api.ipify.org/tRegSvcs.exe, 00000004.00000002.3864240019.00000000030A1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000004.00000002.3864240019.00000000030A1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://beirutrest.comRegSvcs.exe, 00000004.00000002.3864240019.000000000311F000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://microsoft.coRegSvcs.exe, 00000004.00000002.3866479524.0000000005790000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  50.87.144.157
                                  beirutrest.comUnited States
                                  46606UNIFIEDLAYER-AS-1USfalse
                                  172.67.74.152
                                  api.ipify.orgUnited States
                                  13335CLOUDFLARENETUSfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1569280
                                  Start date and time:2024-12-05 17:18:55 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 9m 57s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:9
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:0wxckB4Iba.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:b42c4f2e9db240e5bb32ecc0d46793b4a343749d7972a6d698354316b695e24f.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@7/1@2/2
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 96%
                                  • Number of executed functions: 42
                                  • Number of non-executed functions: 313
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • VT rate limit hit for: 0wxckB4Iba.exe
                                  TimeTypeDescription
                                  11:19:58API Interceptor10155775x Sleep call for process: RegSvcs.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  50.87.144.157pR65xo6sud.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    ship's particulars-TBN.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                      Packing List - SAPPHIRE X.xlsx.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                        WOOYANG VENUS PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                          CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            MV BBG MUARA Ship's Particulars.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                              CHARIKLIA JUNIOR DETAILS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                PEACE SHIP PARTICULARS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  ZHENGHE 3_Q88 20241118.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    01. MT JS JIANGYIN Ship Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      172.67.74.1522b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                                      • api.ipify.org/
                                                      Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
                                                      • api.ipify.org/
                                                      67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                                                      • api.ipify.org/
                                                      Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                      • api.ipify.org/
                                                      4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                                                      • api.ipify.org/
                                                      y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
                                                      • api.ipify.org/
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • api.ipify.org/
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • api.ipify.org/
                                                      file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                                      • api.ipify.org/
                                                      file.exeGet hashmaliciousRDPWrap ToolBrowse
                                                      • api.ipify.org/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      beirutrest.compR65xo6sud.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 50.87.144.157
                                                      ship's particulars-TBN.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                      • 50.87.144.157
                                                      Packing List - SAPPHIRE X.xlsx.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                      • 50.87.144.157
                                                      WOOYANG VENUS PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                      • 50.87.144.157
                                                      CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 50.87.144.157
                                                      MV BBG MUARA Ship's Particulars.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 50.87.144.157
                                                      CHARIKLIA JUNIOR DETAILS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 50.87.144.157
                                                      PEACE SHIP PARTICULARS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 50.87.144.157
                                                      ZHENGHE 3_Q88 20241118.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 50.87.144.157
                                                      01. MT JS JIANGYIN Ship Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 50.87.144.157
                                                      api.ipify.orgOHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                      • 172.67.74.152
                                                      8JuGuaUaZP.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      lUy4SKlE6A.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      xFHqehx1tb.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                      • 104.26.12.205
                                                      https://app.peony.ink/view/902b02a8-11f0-4e28-89b1-5318035c10ebGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                      • 104.26.12.205
                                                      7Gt3icFvQW.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      1AxSwjpyGp.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                      • 104.26.12.205
                                                      FPBKcOFjEP.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                      • 104.26.12.205
                                                      MerchantDetailedStatement_37063_04122024.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      https://click.pstmrk.it/3s/bmxn8t84vg.gherapilta.shop%2F/ySDk/28y5AQ/AQ/e82f1f59-f734-42be-affb-895d81855fb4/1/pD2JDTOBnbGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                      • 104.26.12.205
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      UNIFIEDLAYER-AS-1US8JuGuaUaZP.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 50.87.218.140
                                                      #U25b6#Ufe0fPlayVoiceMessage9312.emlGet hashmaliciousUnknownBrowse
                                                      • 192.185.77.66
                                                      tmp667.HtML.htmlGet hashmaliciousUnknownBrowse
                                                      • 50.116.87.59
                                                      RFQ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 50.87.139.143
                                                      BACS190027-01.pdfGet hashmaliciousUnknownBrowse
                                                      • 50.116.113.32
                                                      https://iemetodista.com.br/?data=c2VydmljZUBqcHBsdXMuY29tGet hashmaliciousUnknownBrowse
                                                      • 108.179.252.197
                                                      http://voicemaaila.3utilities.comGet hashmaliciousUnknownBrowse
                                                      • 192.185.179.156
                                                      Danellarealty 1052.htmlGet hashmaliciousUnknownBrowse
                                                      • 69.49.245.172
                                                      sora.sh4.elfGet hashmaliciousMiraiBrowse
                                                      • 98.130.22.65
                                                      Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 192.185.13.234
                                                      CLOUDFLARENETUS6SQADa3zKv.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
                                                      • 172.67.153.63
                                                      Uit9z2gICf.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                      • 172.67.177.134
                                                      OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                      • 172.67.74.152
                                                      3D7sM44MQp.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                      • 172.67.177.134
                                                      8JuGuaUaZP.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      lUy4SKlE6A.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      http://kitces.emlnk1.comGet hashmaliciousUnknownBrowse
                                                      • 104.20.0.15
                                                      https://vacilandoblog.wordpress.com/2015/04/22/a-tribute-to-my-mother-in-law-rest-in-peace-april-22-2015/Get hashmaliciousUnknownBrowse
                                                      • 172.64.150.63
                                                      DX7V71Ro7b.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 172.67.177.134
                                                      xFHqehx1tb.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                      • 104.26.12.205
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      3b5074b1b5d032e5620f69f9f700ff0eOHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                      • 172.67.74.152
                                                      8JuGuaUaZP.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 172.67.74.152
                                                      lUy4SKlE6A.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 172.67.74.152
                                                      DX7V71Ro7b.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 172.67.74.152
                                                      xFHqehx1tb.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                      • 172.67.74.152
                                                      9KpgpwwGDy.imgGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 172.67.74.152
                                                      z43INF_20231205_A1B5C3.msiGet hashmaliciousUnknownBrowse
                                                      • 172.67.74.152
                                                      9V4TlKwcz3.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      • 172.67.74.152
                                                      uC70JKtV2B.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      • 172.67.74.152
                                                      cxYwMzCUCd.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      • 172.67.74.152
                                                      No context
                                                      Process:C:\Users\user\Desktop\0wxckB4Iba.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):266752
                                                      Entropy (8bit):7.8801143543895025
                                                      Encrypted:false
                                                      SSDEEP:6144:JV9n+AOtYYECmrEnAZjwnPE03B0pdJc9RyegYMDIYm:JLOtYYECmjwJ3KqnyblDIV
                                                      MD5:CCF9D5B3ABFA03F92FEFD1252A450A52
                                                      SHA1:D719753E517C1CACB1300C5172E8B71285241EFB
                                                      SHA-256:1A15BC9B84B7F47A65C04BC040A42BD71F68426B0E471421D5B827EECAADFC0A
                                                      SHA-512:0C9BE10CCBFECD9DF2120D252428FE9BD3C5AF6533144D7ED7BFA205FA46D65966BED057C0DCD22383732B270A53D2E39188FD729D7278BB68DBCB8229383444
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...KP6UEKVCB..BZ.FJC7KS6.EOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6.EOVM].TB._.k.6....-&%c2"5%(7+j V%=Y!e-3c0%4b38f..dk>Y1 a[NHtZBZVFJC_[..y4.(o3.$n+.8x`H5lG.;D..<{+.$z7.=k:.Hgf!(_3.$py?8.2.5a..;b'.<.3!2z7.=7KS6UEOVCBPZBZVF$...S6UE..CB.[FZ".J.7KS6UEOV.Bs[I[_FJ.6KS@WEOVCB..BZVVJC7.R6UE.VCRPZBXVFOC7KS6UEJVCBPZBZV&NC7OS6.~MVABP.BZFFJS7KS6EEOFCBPZBZFFJC7KS6UEOV.WRZ.ZVFJ#5K..TEOVCBPZBZVFJC7KS6UEOVCBPZ..WFVC7KS6UEOVCBPZBZVFJC7KS6UEOV.ORZ.ZVFJC7KS6UEO.BB.[BZVFJC7KS6UEOVCBPZBZVFJC7K}B0=;VCBH.CZVVJC7.R6UAOVCBPZBZVFJC7Ks6U%a$'#$;BZ.+JC7.R6U+OVC.QZBZVFJC7KS6UE.VC.~>#.7FJC.{S6UeMVCTPZBPTFJC7KS6UEOVCB.ZB.x491TKS6..NVC"RZB.WFJc5KS6UEOVCBPZBZ.FJ.7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOVCBPZBZVFJC7KS6UEOV
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.471016589490573
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 95.11%
                                                      • AutoIt3 compiled script executable (510682/80) 4.86%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:0wxckB4Iba.exe
                                                      File size:1'260'925 bytes
                                                      MD5:dd7a345d9054fa43a8ef12c5b037c037
                                                      SHA1:7de32f230eed1e670e4701ecc3e47350cc17c1b9
                                                      SHA256:b42c4f2e9db240e5bb32ecc0d46793b4a343749d7972a6d698354316b695e24f
                                                      SHA512:2dd8a68c9c91bb5394f75fc051e9aa715682879b76119eaa1ee7368ec57af716d796e6b8e9ab8007cf5a943da44c5ce3dc93be3bcd1e3eda34d07346695017be
                                                      SSDEEP:24576:ffmMv6Ckr7Mny5QLhg+HvYehdAURKL9NK4xsTFhdJUheffu:f3v+7/5QL6+HDT9OsTFh/UhIm
                                                      TLSH:BF45E112F3D680B2D9A339B1297BE32BDB3475194327C4C7ABE02E769F211505B3A761
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
                                                      Icon Hash:1733312925935517
                                                      Entrypoint:0x416310
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x4B93CF87 [Sun Mar 7 16:08:39 2010 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:0
                                                      File Version Major:5
                                                      File Version Minor:0
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:0
                                                      Import Hash:aaaa8913c89c8aa4a5d93f06853894da
                                                      Instruction
                                                      call 00007FE3652E522Ch
                                                      jmp 00007FE3652D8FFEh
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      push ebp
                                                      mov ebp, esp
                                                      push edi
                                                      push esi
                                                      mov esi, dword ptr [ebp+0Ch]
                                                      mov ecx, dword ptr [ebp+10h]
                                                      mov edi, dword ptr [ebp+08h]
                                                      mov eax, ecx
                                                      mov edx, ecx
                                                      add eax, esi
                                                      cmp edi, esi
                                                      jbe 00007FE3652D918Ah
                                                      cmp edi, eax
                                                      jc 00007FE3652D932Ah
                                                      cmp ecx, 00000100h
                                                      jc 00007FE3652D91A1h
                                                      cmp dword ptr [004A94E0h], 00000000h
                                                      je 00007FE3652D9198h
                                                      push edi
                                                      push esi
                                                      and edi, 0Fh
                                                      and esi, 0Fh
                                                      cmp edi, esi
                                                      pop esi
                                                      pop edi
                                                      jne 00007FE3652D918Ah
                                                      pop esi
                                                      pop edi
                                                      pop ebp
                                                      jmp 00007FE3652D95EAh
                                                      test edi, 00000003h
                                                      jne 00007FE3652D9197h
                                                      shr ecx, 02h
                                                      and edx, 03h
                                                      cmp ecx, 08h
                                                      jc 00007FE3652D91ACh
                                                      rep movsd
                                                      jmp dword ptr [00416494h+edx*4]
                                                      nop
                                                      mov eax, edi
                                                      mov edx, 00000003h
                                                      sub ecx, 04h
                                                      jc 00007FE3652D918Eh
                                                      and eax, 03h
                                                      add ecx, eax
                                                      jmp dword ptr [004163A8h+eax*4]
                                                      jmp dword ptr [004164A4h+ecx*4]
                                                      nop
                                                      jmp dword ptr [00416428h+ecx*4]
                                                      nop
                                                      mov eax, E4004163h
                                                      arpl word ptr [ecx+00h], ax
                                                      or byte ptr [ecx+eax*2+00h], ah
                                                      and edx, ecx
                                                      mov al, byte ptr [esi]
                                                      mov byte ptr [edi], al
                                                      mov al, byte ptr [esi+01h]
                                                      mov byte ptr [edi+01h], al
                                                      mov al, byte ptr [esi+02h]
                                                      shr ecx, 02h
                                                      mov byte ptr [edi+02h], al
                                                      add esi, 03h
                                                      add edi, 03h
                                                      cmp ecx, 08h
                                                      jc 00007FE3652D914Eh
                                                      Programming Language:
                                                      • [ASM] VS2008 SP1 build 30729
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [C++] VS2008 SP1 build 30729
                                                      • [ C ] VS2005 build 50727
                                                      • [IMP] VS2005 build 50727
                                                      • [ASM] VS2008 build 21022
                                                      • [RES] VS2008 build 21022
                                                      • [LNK] VS2008 SP1 build 30729
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9298.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x800170x802006c20c6bf686768b6f134f5bd508171bcFalse0.5602991615853659data6.634688230255595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x820000xd95c0xda00f979966509a93083729d23cdfd2a6f2dFalse0.36256450688073394data4.880040824124099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0x900000x1a5180x6800e5d77411f751d28c6eee48a743606795False0.1600060096153846data2.2017649896261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xab0000x92980x9400f6be76de0ef2c68f397158bf01bdef3eFalse0.4896801097972973data5.530303089784181IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                      RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                      RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                                      RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                                      RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                                      RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                                      RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                                      RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                                      RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                                      RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                                      RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                                      RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                                      RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                                      RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                                      RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                                      RT_STRING0xb28380x43adataEnglishGreat Britain0.3733826247689464
                                                      RT_STRING0xb2c780x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xb32780x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xb38d80x388dataEnglishGreat Britain0.377212389380531
                                                      RT_STRING0xb3c600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                      RT_GROUP_ICON0xb3db80x84dataEnglishGreat Britain0.6439393939393939
                                                      RT_GROUP_ICON0xb3e400x14dataEnglishGreat Britain1.15
                                                      RT_GROUP_ICON0xb3e580x14dataEnglishGreat Britain1.25
                                                      RT_GROUP_ICON0xb3e700x14dataEnglishGreat Britain1.25
                                                      RT_VERSION0xb3e880x19cdataEnglishGreat Britain0.5339805825242718
                                                      RT_MANIFEST0xb40280x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                      DLLImport
                                                      WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                      VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                      MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                      WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                      PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                      USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                      KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
                                                      USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
                                                      GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                      ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
                                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                      ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
                                                      OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      EnglishUnited States
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 5, 2024 17:19:56.822577953 CET49706443192.168.2.8172.67.74.152
                                                      Dec 5, 2024 17:19:56.822594881 CET44349706172.67.74.152192.168.2.8
                                                      Dec 5, 2024 17:19:56.822689056 CET49706443192.168.2.8172.67.74.152
                                                      Dec 5, 2024 17:19:56.877506018 CET49706443192.168.2.8172.67.74.152
                                                      Dec 5, 2024 17:19:56.877531052 CET44349706172.67.74.152192.168.2.8
                                                      Dec 5, 2024 17:19:58.095854044 CET44349706172.67.74.152192.168.2.8
                                                      Dec 5, 2024 17:19:58.095931053 CET49706443192.168.2.8172.67.74.152
                                                      Dec 5, 2024 17:19:58.102241993 CET49706443192.168.2.8172.67.74.152
                                                      Dec 5, 2024 17:19:58.102248907 CET44349706172.67.74.152192.168.2.8
                                                      Dec 5, 2024 17:19:58.102557898 CET44349706172.67.74.152192.168.2.8
                                                      Dec 5, 2024 17:19:58.155226946 CET49706443192.168.2.8172.67.74.152
                                                      Dec 5, 2024 17:19:58.195897102 CET49706443192.168.2.8172.67.74.152
                                                      Dec 5, 2024 17:19:58.243329048 CET44349706172.67.74.152192.168.2.8
                                                      Dec 5, 2024 17:19:58.539766073 CET44349706172.67.74.152192.168.2.8
                                                      Dec 5, 2024 17:19:58.539825916 CET44349706172.67.74.152192.168.2.8
                                                      Dec 5, 2024 17:19:58.539948940 CET49706443192.168.2.8172.67.74.152
                                                      Dec 5, 2024 17:19:58.560827017 CET49706443192.168.2.8172.67.74.152
                                                      Dec 5, 2024 17:19:59.792651892 CET4970721192.168.2.850.87.144.157
                                                      Dec 5, 2024 17:19:59.912537098 CET214970750.87.144.157192.168.2.8
                                                      Dec 5, 2024 17:19:59.913944960 CET4970721192.168.2.850.87.144.157
                                                      Dec 5, 2024 17:19:59.917920113 CET4970721192.168.2.850.87.144.157
                                                      Dec 5, 2024 17:20:00.042560101 CET214970750.87.144.157192.168.2.8
                                                      Dec 5, 2024 17:20:00.042576075 CET214970750.87.144.157192.168.2.8
                                                      Dec 5, 2024 17:20:00.042643070 CET4970721192.168.2.850.87.144.157
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 5, 2024 17:19:56.677978039 CET5281353192.168.2.81.1.1.1
                                                      Dec 5, 2024 17:19:56.817538023 CET53528131.1.1.1192.168.2.8
                                                      Dec 5, 2024 17:19:59.176430941 CET5543553192.168.2.81.1.1.1
                                                      Dec 5, 2024 17:19:59.791019917 CET53554351.1.1.1192.168.2.8
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Dec 5, 2024 17:19:56.677978039 CET192.168.2.81.1.1.10xabc2Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      Dec 5, 2024 17:19:59.176430941 CET192.168.2.81.1.1.10x5015Standard query (0)beirutrest.comA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Dec 5, 2024 17:19:56.817538023 CET1.1.1.1192.168.2.80xabc2No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                      Dec 5, 2024 17:19:56.817538023 CET1.1.1.1192.168.2.80xabc2No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                      Dec 5, 2024 17:19:56.817538023 CET1.1.1.1192.168.2.80xabc2No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                      Dec 5, 2024 17:19:59.791019917 CET1.1.1.1192.168.2.80x5015No error (0)beirutrest.com50.87.144.157A (IP address)IN (0x0001)false
                                                      • api.ipify.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.849706172.67.74.1524431988C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-12-05 16:19:58 UTC155OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                      Host: api.ipify.org
                                                      Connection: Keep-Alive
                                                      2024-12-05 16:19:58 UTC424INHTTP/1.1 200 OK
                                                      Date: Thu, 05 Dec 2024 16:19:58 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 12
                                                      Connection: close
                                                      Vary: Origin
                                                      CF-Cache-Status: DYNAMIC
                                                      Server: cloudflare
                                                      CF-RAY: 8ed55c61ccd57d08-EWR
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1880&min_rtt=1878&rtt_var=708&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1541710&cwnd=175&unsent_bytes=0&cid=0094718acc1327b2&ts=454&x=0"
                                                      2024-12-05 16:19:58 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                      Data Ascii: 8.46.123.228


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:11:19:49
                                                      Start date:05/12/2024
                                                      Path:C:\Users\user\Desktop\0wxckB4Iba.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\0wxckB4Iba.exe"
                                                      Imagebase:0x400000
                                                      File size:1'260'925 bytes
                                                      MD5 hash:DD7A345D9054FA43A8EF12C5B037C037
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1423973126.0000000003B40000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:11:19:51
                                                      Start date:05/12/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\Desktop\0wxckB4Iba.exe"
                                                      Imagebase:0x270000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:11:19:51
                                                      Start date:05/12/2024
                                                      Path:C:\Users\user\Desktop\0wxckB4Iba.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\0wxckB4Iba.exe"
                                                      Imagebase:0x400000
                                                      File size:1'260'925 bytes
                                                      MD5 hash:DD7A345D9054FA43A8EF12C5B037C037
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000003.00000002.1458451104.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:11:19:55
                                                      Start date:05/12/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\0wxckB4Iba.exe"
                                                      Imagebase:0xc20000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3864240019.000000000311F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000004.00000002.3861070576.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.3863207358.0000000002CEE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000004.00000002.3865864702.0000000005530000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.3865531941.00000000040A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3864240019.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3864240019.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000004.00000002.3866717026.0000000005800000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:high
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:2.9%
                                                        Dynamic/Decrypted Code Coverage:1.2%
                                                        Signature Coverage:4.3%
                                                        Total number of Nodes:1580
                                                        Total number of Limit Nodes:39
                                                        execution_graph 90383 40f110 RegOpenKeyExW 90384 40f13c RegQueryValueExW RegCloseKey 90383->90384 90385 40f15f 90383->90385 90384->90385 90386 429212 90391 410b90 90386->90391 90389 411421 __cinit 74 API calls 90390 42922f 90389->90390 90392 410b9a __write_nolock 90391->90392 90393 41171a 75 API calls 90392->90393 90394 410c31 GetModuleFileNameW 90393->90394 90408 413db0 90394->90408 90396 410c66 _wcsncat 90411 413e3c 90396->90411 90399 41171a 75 API calls 90400 410ca3 _wcscpy 90399->90400 90401 410cd1 RegOpenKeyExW 90400->90401 90402 429bc3 RegQueryValueExW 90401->90402 90403 410cf7 90401->90403 90404 429cd9 RegCloseKey 90402->90404 90406 429bf2 _wcscat _wcslen _wcsncpy 90402->90406 90403->90389 90405 41171a 75 API calls 90405->90406 90406->90405 90407 429cd8 90406->90407 90407->90404 90414 413b95 90408->90414 90444 41abec 90411->90444 90415 413c2f 90414->90415 90420 413bae 90414->90420 90416 413d60 90415->90416 90417 413d7b 90415->90417 90440 417f23 67 API calls __getptd_noexit 90416->90440 90442 417f23 67 API calls __getptd_noexit 90417->90442 90420->90415 90430 413c1d 90420->90430 90436 41ab19 67 API calls ___wstrgtold12_l 90420->90436 90421 413d65 90426 413cfb 90421->90426 90441 417ebb 6 API calls 2 library calls 90421->90441 90424 413d03 90424->90415 90424->90426 90428 413d8e 90424->90428 90425 413cb9 90425->90415 90427 413cd6 90425->90427 90438 41ab19 67 API calls ___wstrgtold12_l 90425->90438 90426->90396 90427->90415 90427->90426 90432 413cef 90427->90432 90443 41ab19 67 API calls ___wstrgtold12_l 90428->90443 90430->90415 90435 413c9b 90430->90435 90437 41ab19 67 API calls ___wstrgtold12_l 90430->90437 90439 41ab19 67 API calls ___wstrgtold12_l 90432->90439 90435->90424 90435->90425 90436->90430 90437->90435 90438->90427 90439->90426 90440->90421 90442->90421 90443->90426 90445 41ac02 90444->90445 90446 41abfd 90444->90446 90453 417f23 67 API calls __getptd_noexit 90445->90453 90446->90445 90448 41ac22 90446->90448 90451 410c99 90448->90451 90455 417f23 67 API calls __getptd_noexit 90448->90455 90451->90399 90452 41ac07 90454 417ebb 6 API calls 2 library calls 90452->90454 90453->90452 90455->90452 90456 401230 90457 401241 _memset 90456->90457 90458 4012c5 90456->90458 90471 401be0 90457->90471 90460 40126b 90461 4012ae KillTimer SetTimer 90460->90461 90462 42aa61 90460->90462 90463 401298 90460->90463 90461->90458 90466 42aa8b Shell_NotifyIconW 90462->90466 90467 42aa69 Shell_NotifyIconW 90462->90467 90464 4012a2 90463->90464 90465 42aaac 90463->90465 90464->90461 90468 42aaf8 Shell_NotifyIconW 90464->90468 90469 42aad7 Shell_NotifyIconW 90465->90469 90470 42aab5 Shell_NotifyIconW 90465->90470 90466->90461 90467->90461 90468->90461 90469->90461 90470->90461 90472 401bfb 90471->90472 90492 401cde 90471->90492 90493 4013a0 75 API calls 90472->90493 90474 401c0b 90475 42a9a0 LoadStringW 90474->90475 90476 401c18 90474->90476 90478 42a9bb 90475->90478 90494 4021e0 90476->90494 90507 40df50 75 API calls 90478->90507 90479 401c2d 90481 401c3a 90479->90481 90482 42a9cd 90479->90482 90481->90478 90483 401c44 90481->90483 90508 40d3b0 75 API calls 2 library calls 90482->90508 90506 40d3b0 75 API calls 2 library calls 90483->90506 90485 401c53 _memset _wcscpy _wcsncpy 90491 401cc2 Shell_NotifyIconW 90485->90491 90487 42a9dc 90487->90485 90488 42a9f0 90487->90488 90509 40d3b0 75 API calls 2 library calls 90488->90509 90490 42a9fe 90491->90492 90492->90460 90493->90474 90495 4021f1 _wcslen 90494->90495 90496 42a598 90494->90496 90499 402205 90495->90499 90500 402226 90495->90500 90512 40c740 90496->90512 90498 42a5a2 90510 404020 75 API calls ctype 90499->90510 90511 401380 75 API calls 90500->90511 90503 40220c _memcpy_s 90503->90479 90504 40222d 90504->90498 90505 41171a 75 API calls 90504->90505 90505->90503 90506->90485 90507->90485 90508->90487 90509->90490 90510->90503 90511->90504 90513 40c752 90512->90513 90514 40c747 90512->90514 90513->90498 90514->90513 90517 402ae0 75 API calls _memcpy_s 90514->90517 90516 42a572 _memcpy_s 90516->90498 90517->90516 90518 4034b0 90519 4034b9 90518->90519 90520 4034bd 90518->90520 90521 42a0ba 90520->90521 90522 41171a 75 API calls 90520->90522 90523 4034fe _memcpy_s ctype 90522->90523 90524 416193 90561 41718c 90524->90561 90526 41619f GetStartupInfoW 90528 4161c2 90526->90528 90562 41aa31 HeapCreate 90528->90562 90530 416212 90564 416e29 GetModuleHandleW 90530->90564 90534 416223 __RTC_Initialize 90598 41b669 90534->90598 90537 416231 90538 41623d GetCommandLineW 90537->90538 90666 4117af 67 API calls 3 library calls 90537->90666 90613 42235f GetEnvironmentStringsW 90538->90613 90541 41623c 90541->90538 90542 41624c 90619 4222b1 GetModuleFileNameW 90542->90619 90544 416256 90545 416261 90544->90545 90667 4117af 67 API calls 3 library calls 90544->90667 90623 422082 90545->90623 90549 416272 90636 41186e 90549->90636 90552 416279 90554 416284 __wwincmdln 90552->90554 90669 4117af 67 API calls 3 library calls 90552->90669 90642 40d7f0 90554->90642 90557 4162b3 90671 411a4b 67 API calls _doexit 90557->90671 90560 4162b8 __fcloseall 90561->90526 90563 416206 90562->90563 90563->90530 90664 41616a 67 API calls 3 library calls 90563->90664 90565 416e44 90564->90565 90566 416e3d 90564->90566 90568 416fac 90565->90568 90569 416e4e GetProcAddress GetProcAddress GetProcAddress GetProcAddress 90565->90569 90672 41177f Sleep GetModuleHandleW 90566->90672 90682 416ad5 70 API calls 2 library calls 90568->90682 90570 416e97 TlsAlloc 90569->90570 90574 416218 90570->90574 90575 416ee5 TlsSetValue 90570->90575 90572 416e43 90572->90565 90574->90534 90665 41616a 67 API calls 3 library calls 90574->90665 90575->90574 90576 416ef6 90575->90576 90673 411a69 6 API calls 4 library calls 90576->90673 90578 416efb 90579 41696e __encode_pointer 6 API calls 90578->90579 90580 416f06 90579->90580 90581 41696e __encode_pointer 6 API calls 90580->90581 90582 416f16 90581->90582 90583 41696e __encode_pointer 6 API calls 90582->90583 90584 416f26 90583->90584 90585 41696e __encode_pointer 6 API calls 90584->90585 90586 416f36 90585->90586 90674 41828b InitializeCriticalSectionAndSpinCount __ioinit 90586->90674 90588 416f43 90588->90568 90589 4169e9 __decode_pointer 6 API calls 90588->90589 90590 416f57 90589->90590 90590->90568 90675 416ffb 90590->90675 90593 4169e9 __decode_pointer 6 API calls 90594 416f8a 90593->90594 90594->90568 90595 416f91 90594->90595 90681 416b12 67 API calls 5 library calls 90595->90681 90597 416f99 GetCurrentThreadId 90597->90574 90701 41718c 90598->90701 90600 41b675 GetStartupInfoA 90601 416ffb __calloc_crt 67 API calls 90600->90601 90608 41b696 90601->90608 90602 41b8b4 __fcloseall 90602->90537 90603 41b831 GetStdHandle 90607 41b7fb 90603->90607 90604 416ffb __calloc_crt 67 API calls 90604->90608 90605 41b896 SetHandleCount 90605->90602 90606 41b843 GetFileType 90606->90607 90607->90602 90607->90603 90607->90605 90607->90606 90703 4189e6 InitializeCriticalSectionAndSpinCount __fcloseall 90607->90703 90608->90602 90608->90604 90608->90607 90609 41b77e 90608->90609 90609->90602 90609->90607 90610 41b7a7 GetFileType 90609->90610 90702 4189e6 InitializeCriticalSectionAndSpinCount __fcloseall 90609->90702 90610->90609 90614 422370 90613->90614 90615 422374 90613->90615 90614->90542 90616 416fb6 __malloc_crt 67 API calls 90615->90616 90617 422395 _memcpy_s 90616->90617 90618 42239c FreeEnvironmentStringsW 90617->90618 90618->90542 90620 4222e6 _wparse_cmdline 90619->90620 90621 416fb6 __malloc_crt 67 API calls 90620->90621 90622 422329 _wparse_cmdline 90620->90622 90621->90622 90622->90544 90624 42209a _wcslen 90623->90624 90628 416267 90623->90628 90625 416ffb __calloc_crt 67 API calls 90624->90625 90631 4220be _wcslen 90625->90631 90626 422123 90627 413a88 __getptd_noexit 67 API calls 90626->90627 90627->90628 90628->90549 90668 4117af 67 API calls 3 library calls 90628->90668 90629 416ffb __calloc_crt 67 API calls 90629->90631 90630 422149 90632 413a88 __getptd_noexit 67 API calls 90630->90632 90631->90626 90631->90628 90631->90629 90631->90630 90634 422108 90631->90634 90704 426349 67 API calls ___wstrgtold12_l 90631->90704 90632->90628 90634->90631 90705 417d93 10 API calls 3 library calls 90634->90705 90637 41187c __IsNonwritableInCurrentImage 90636->90637 90706 418486 90637->90706 90639 41189a __initterm_e 90640 411421 __cinit 74 API calls 90639->90640 90641 4118b9 __IsNonwritableInCurrentImage __initterm 90639->90641 90640->90641 90641->90552 90643 431bcb 90642->90643 90644 40d80c 90642->90644 90645 4092c0 VariantClear 90644->90645 90646 40d847 90645->90646 90710 40eb50 90646->90710 90649 40d877 90713 411ac6 67 API calls 4 library calls 90649->90713 90652 40d888 90714 411b24 67 API calls ___wstrgtold12_l 90652->90714 90654 40d891 90715 40f370 SystemParametersInfoW SystemParametersInfoW 90654->90715 90656 40d89f 90716 40d6d0 GetCurrentDirectoryW 90656->90716 90658 40d8a7 SystemParametersInfoW 90659 40d8cd 90658->90659 90660 4092c0 VariantClear 90659->90660 90661 40d8dd 90660->90661 90662 4092c0 VariantClear 90661->90662 90663 40d8e6 90662->90663 90663->90557 90670 411a1f 67 API calls _doexit 90663->90670 90664->90530 90665->90534 90666->90541 90667->90545 90668->90549 90669->90554 90670->90557 90671->90560 90672->90572 90673->90578 90674->90588 90676 417004 90675->90676 90678 416f70 90676->90678 90679 417022 Sleep 90676->90679 90683 422452 90676->90683 90678->90568 90678->90593 90680 417037 90679->90680 90680->90676 90680->90678 90681->90597 90682->90574 90684 42245e __fcloseall 90683->90684 90685 422476 90684->90685 90695 422495 _memset 90684->90695 90696 417f23 67 API calls __getptd_noexit 90685->90696 90687 42247b 90697 417ebb 6 API calls 2 library calls 90687->90697 90689 422507 HeapAlloc 90689->90695 90690 42248b __fcloseall 90690->90676 90692 418407 __lock 66 API calls 90692->90695 90695->90689 90695->90690 90695->90692 90698 41a74c 5 API calls 2 library calls 90695->90698 90699 42254e LeaveCriticalSection _doexit 90695->90699 90700 411afc 6 API calls __decode_pointer 90695->90700 90696->90687 90698->90695 90699->90695 90700->90695 90701->90600 90702->90609 90703->90607 90704->90631 90705->90634 90707 41848c 90706->90707 90708 41696e __encode_pointer 6 API calls 90707->90708 90709 4184a4 90707->90709 90708->90707 90709->90639 90754 40eb70 90710->90754 90713->90652 90714->90654 90715->90656 90758 401f80 90716->90758 90718 40d6f1 IsDebuggerPresent 90719 431a9d MessageBoxA 90718->90719 90720 40d6ff 90718->90720 90721 431ab6 90719->90721 90720->90721 90722 40d71f 90720->90722 90851 403e90 75 API calls 3 library calls 90721->90851 90828 40f3b0 90722->90828 90726 40d73a GetFullPathNameW 90848 401440 127 API calls _wcscat 90726->90848 90728 40d77a 90729 40d782 90728->90729 90731 431b09 SetCurrentDirectoryW 90728->90731 90730 40d78b 90729->90730 90852 43604b 6 API calls 90729->90852 90840 4101f0 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 90730->90840 90731->90729 90734 431b28 90734->90730 90736 431b30 GetModuleFileNameW 90734->90736 90738 431ba4 GetForegroundWindow ShellExecuteW 90736->90738 90739 431b4c 90736->90739 90742 40d7c7 90738->90742 90853 401b70 90739->90853 90740 40d795 90748 40d7a8 90740->90748 90849 40e1e0 97 API calls _memset 90740->90849 90746 40d7d1 SetCurrentDirectoryW 90742->90746 90746->90658 90747 431b66 90860 40d3b0 75 API calls 2 library calls 90747->90860 90748->90742 90850 401000 Shell_NotifyIconW _memset 90748->90850 90751 431b72 GetForegroundWindow ShellExecuteW 90752 431b9f 90751->90752 90752->90742 90753 40eba0 LoadLibraryA GetProcAddress 90753->90649 90755 40d86e 90754->90755 90756 40eb76 LoadLibraryA 90754->90756 90755->90649 90755->90753 90756->90755 90757 40eb87 GetProcAddress 90756->90757 90757->90755 90861 40e680 75 API calls 90758->90861 90760 401f90 90862 402940 75 API calls __write_nolock 90760->90862 90762 401fa2 GetModuleFileNameW 90863 40ff90 90762->90863 90764 401fbd 90875 4107b0 75 API calls 90764->90875 90766 401fd6 90767 401b70 75 API calls 90766->90767 90768 401fe4 90767->90768 90876 4019e0 76 API calls 90768->90876 90770 401ff2 90771 4092c0 VariantClear 90770->90771 90772 402002 90771->90772 90773 401b70 75 API calls 90772->90773 90774 40201c 90773->90774 90877 4019e0 76 API calls 90774->90877 90776 40202c 90777 401b70 75 API calls 90776->90777 90778 40203c 90777->90778 90878 40c3e0 75 API calls 90778->90878 90780 40204d 90879 40c060 90780->90879 90784 40206e 90885 4115d0 79 API calls 2 library calls 90784->90885 90786 40207d 90787 42c174 90786->90787 90788 402088 90786->90788 90896 401a70 75 API calls 90787->90896 90886 4115d0 79 API calls 2 library calls 90788->90886 90791 42c189 90897 401a70 75 API calls 90791->90897 90792 402093 90792->90791 90793 40209e 90792->90793 90887 4115d0 79 API calls 2 library calls 90793->90887 90796 42c1a7 90798 42c1b0 GetModuleFileNameW 90796->90798 90797 4020a9 90797->90798 90799 4020b4 90797->90799 90898 401a70 75 API calls 90798->90898 90888 4115d0 79 API calls 2 library calls 90799->90888 90802 4020bf 90804 402107 90802->90804 90813 42c20a _wcscpy 90802->90813 90889 401a70 75 API calls 90802->90889 90803 42c1e2 90899 40df50 75 API calls 90803->90899 90807 402119 90804->90807 90804->90813 90806 42c1f1 90900 401a70 75 API calls 90806->90900 90810 42c243 90807->90810 90891 40e7e0 76 API calls 90807->90891 90811 4020e5 _wcscpy 90890 401a70 75 API calls 90811->90890 90812 42c201 90812->90813 90901 401a70 75 API calls 90813->90901 90816 402132 90892 40d030 76 API calls 90816->90892 90818 40213e 90820 4092c0 VariantClear 90818->90820 90823 402148 90820->90823 90821 402184 90825 4092c0 VariantClear 90821->90825 90823->90821 90893 40d030 76 API calls 90823->90893 90894 40e640 76 API calls 90823->90894 90895 401a70 75 API calls 90823->90895 90827 402196 ctype 90825->90827 90827->90718 90829 42ccf4 _memset 90828->90829 90830 40f3c9 90828->90830 90833 42cd05 GetOpenFileNameW 90829->90833 91562 40ffb0 76 API calls ctype 90830->91562 90832 40f3d2 91563 410130 SHGetMalloc 90832->91563 90833->90830 90836 40d732 90833->90836 90835 40f3d9 91568 410020 88 API calls __wcsicoll 90835->91568 90836->90726 90836->90728 90838 40f3e7 91569 40f400 90838->91569 90841 42b9d3 90840->90841 90842 41025a LoadImageW RegisterClassExW 90840->90842 91614 443e8f EnumResourceNamesW LoadImageW 90841->91614 91613 4102f0 7 API calls 90842->91613 90845 42b9da 90846 40d790 90847 4103e0 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 90846->90847 90847->90740 90848->90728 90849->90748 90850->90742 90851->90728 90852->90734 90854 401b76 _wcslen 90853->90854 90855 41171a 75 API calls 90854->90855 90858 401bc5 90854->90858 90856 401bad _memcpy_s 90855->90856 90857 41171a 75 API calls 90856->90857 90857->90858 90859 40d3b0 75 API calls 2 library calls 90858->90859 90859->90747 90860->90751 90861->90760 90862->90762 90902 40f5e0 90863->90902 90866 40ffa6 90866->90764 90868 42b6d8 90872 42b6e6 90868->90872 90958 434fe1 90868->90958 90869 413a88 __getptd_noexit 67 API calls 90871 42b6f5 90869->90871 90873 434fe1 106 API calls 90871->90873 90872->90869 90874 42b702 90873->90874 90874->90764 90875->90766 90876->90770 90877->90776 90878->90780 90880 41171a 75 API calls 90879->90880 90881 40c088 90880->90881 90882 41171a 75 API calls 90881->90882 90883 402061 90882->90883 90884 401a70 75 API calls 90883->90884 90884->90784 90885->90786 90886->90792 90887->90797 90888->90802 90889->90811 90890->90804 90891->90816 90892->90818 90893->90823 90894->90823 90895->90823 90896->90791 90897->90796 90898->90803 90899->90806 90900->90812 90901->90823 90962 40f580 90902->90962 90904 40f5f8 _strcat ctype 90970 40f6d0 90904->90970 90909 42b2ee 90999 4151b0 90909->90999 90911 40f679 90911->90909 90912 40f681 90911->90912 90986 414e94 90912->90986 90916 40f68b 90916->90866 90921 452574 90916->90921 90918 42b31d 91005 415484 90918->91005 90920 42b33d 90922 41557c _fseek 105 API calls 90921->90922 90923 4525df 90922->90923 91507 4523ce 90923->91507 90926 4525fc 90926->90868 90927 4151b0 __fread_nolock 81 API calls 90928 45261d 90927->90928 90929 4151b0 __fread_nolock 81 API calls 90928->90929 90930 45262e 90929->90930 90931 4151b0 __fread_nolock 81 API calls 90930->90931 90932 452649 90931->90932 90933 4151b0 __fread_nolock 81 API calls 90932->90933 90934 452666 90933->90934 90935 41557c _fseek 105 API calls 90934->90935 90936 452682 90935->90936 90937 4138ba _malloc 67 API calls 90936->90937 90938 45268e 90937->90938 90939 4138ba _malloc 67 API calls 90938->90939 90940 45269b 90939->90940 90941 4151b0 __fread_nolock 81 API calls 90940->90941 90942 4526ac 90941->90942 90943 44afdc GetSystemTimeAsFileTime 90942->90943 90944 4526bf 90943->90944 90945 4526d5 90944->90945 90946 4526fd 90944->90946 90947 413a88 __getptd_noexit 67 API calls 90945->90947 90948 452704 90946->90948 90949 45275b 90946->90949 90950 4526df 90947->90950 91513 44b195 90948->91513 90952 413a88 __getptd_noexit 67 API calls 90949->90952 90953 413a88 __getptd_noexit 67 API calls 90950->90953 90955 452759 90952->90955 90956 4526e8 90953->90956 90954 452753 90957 413a88 __getptd_noexit 67 API calls 90954->90957 90955->90868 90956->90868 90957->90955 90959 434ff1 90958->90959 90960 434feb 90958->90960 90959->90872 90961 414e94 __fcloseall 106 API calls 90960->90961 90961->90959 90963 429440 90962->90963 90964 40f589 _wcslen 90962->90964 90965 40f58f WideCharToMultiByte 90964->90965 90966 40f5d8 90965->90966 90967 40f5ad 90965->90967 90966->90904 90968 41171a 75 API calls 90967->90968 90969 40f5bb WideCharToMultiByte 90968->90969 90969->90904 90971 40f6dd _strlen 90970->90971 91018 40f790 90971->91018 90974 414e06 91038 414d40 90974->91038 90976 40f666 90976->90909 90977 40f450 90976->90977 90981 40f45a _strcat _memcpy_s __write_nolock 90977->90981 90978 4151b0 __fread_nolock 81 API calls 90978->90981 90979 40f531 90979->90911 90981->90978 90981->90979 90982 42936d 90981->90982 91121 41557c 90981->91121 90983 41557c _fseek 105 API calls 90982->90983 90984 429394 90983->90984 90985 4151b0 __fread_nolock 81 API calls 90984->90985 90985->90979 90987 414ea0 __fcloseall 90986->90987 90988 414ed1 90987->90988 90989 414eb4 90987->90989 90991 415965 __lock_file 68 API calls 90988->90991 90996 414ec9 __fcloseall 90988->90996 91260 417f23 67 API calls __getptd_noexit 90989->91260 90993 414ee9 90991->90993 90992 414eb9 91261 417ebb 6 API calls 2 library calls 90992->91261 91244 414e1d 90993->91244 90996->90916 91329 41511a 90999->91329 91001 4151c8 91002 44afdc 91001->91002 91500 4431e0 91002->91500 91004 44affd 91004->90918 91006 415490 __fcloseall 91005->91006 91007 4154bb 91006->91007 91008 41549e 91006->91008 91010 415965 __lock_file 68 API calls 91007->91010 91504 417f23 67 API calls __getptd_noexit 91008->91504 91012 4154c3 91010->91012 91011 4154a3 91505 417ebb 6 API calls 2 library calls 91011->91505 91014 4152e7 __ftell_nolock 71 API calls 91012->91014 91015 4154cf 91014->91015 91506 4154e8 LeaveCriticalSection LeaveCriticalSection _fseek 91015->91506 91017 4154b3 __fcloseall 91017->90920 91020 40f7ae _memset 91018->91020 91019 42a349 91020->91019 91022 40f628 91020->91022 91023 415258 91020->91023 91022->90974 91024 415285 91023->91024 91025 415268 91023->91025 91024->91025 91026 41528c 91024->91026 91034 417f23 67 API calls __getptd_noexit 91025->91034 91036 41c551 103 API calls 14 library calls 91026->91036 91029 41526d 91035 417ebb 6 API calls 2 library calls 91029->91035 91030 4152b2 91032 41527d 91030->91032 91037 4191c9 101 API calls 7 library calls 91030->91037 91032->91020 91034->91029 91036->91030 91037->91032 91041 414d4c __fcloseall 91038->91041 91039 414d5f 91090 417f23 67 API calls __getptd_noexit 91039->91090 91041->91039 91043 414d95 91041->91043 91042 414d64 91091 417ebb 6 API calls 2 library calls 91042->91091 91057 41e28c 91043->91057 91046 414d9a 91047 414da1 91046->91047 91048 414dae 91046->91048 91092 417f23 67 API calls __getptd_noexit 91047->91092 91049 414dd6 91048->91049 91050 414db6 91048->91050 91075 41dfd8 91049->91075 91093 417f23 67 API calls __getptd_noexit 91050->91093 91054 414d74 __fcloseall @_EH4_CallFilterFunc@8 91054->90976 91058 41e298 __fcloseall 91057->91058 91059 418407 __lock 67 API calls 91058->91059 91070 41e2a6 91059->91070 91060 41e31b 91095 41e3bb 91060->91095 91061 41e322 91063 416fb6 __malloc_crt 67 API calls 91061->91063 91065 41e32c 91063->91065 91064 41e3b0 __fcloseall 91064->91046 91065->91060 91100 4189e6 InitializeCriticalSectionAndSpinCount __fcloseall 91065->91100 91067 418344 __mtinitlocknum 67 API calls 91067->91070 91069 41e351 91071 41e35c 91069->91071 91072 41e36f EnterCriticalSection 91069->91072 91070->91060 91070->91061 91070->91067 91098 4159a6 68 API calls __lock 91070->91098 91099 415a14 LeaveCriticalSection LeaveCriticalSection _doexit 91070->91099 91074 413a88 __getptd_noexit 67 API calls 91071->91074 91072->91060 91074->91060 91077 41dffb __wopenfile 91075->91077 91076 41e015 91105 417f23 67 API calls __getptd_noexit 91076->91105 91077->91076 91089 41e1e9 91077->91089 91107 4136bc 79 API calls 2 library calls 91077->91107 91079 41e01a 91106 417ebb 6 API calls 2 library calls 91079->91106 91081 41e247 91102 425db0 91081->91102 91085 41e1e2 91085->91089 91108 4136bc 79 API calls 2 library calls 91085->91108 91087 41e201 91087->91089 91109 4136bc 79 API calls 2 library calls 91087->91109 91089->91076 91089->91081 91090->91042 91092->91054 91093->91054 91094 414dfc LeaveCriticalSection LeaveCriticalSection _fseek 91094->91054 91101 41832d LeaveCriticalSection 91095->91101 91097 41e3c2 91097->91064 91098->91070 91099->91070 91100->91069 91101->91097 91110 425ce4 91102->91110 91104 414de1 91104->91094 91105->91079 91107->91085 91108->91087 91109->91089 91112 425cf0 __fcloseall 91110->91112 91111 425d03 91113 417f23 ___wstrgtold12_l 67 API calls 91111->91113 91112->91111 91114 425d41 91112->91114 91115 425d08 91113->91115 91116 4255c4 __tsopen_nolock 132 API calls 91114->91116 91117 417ebb ___wstrgtold12_l 6 API calls 91115->91117 91118 425d5b 91116->91118 91120 425d17 __fcloseall 91117->91120 91119 425d82 __sopen_helper LeaveCriticalSection 91118->91119 91119->91120 91120->91104 91124 415588 __fcloseall 91121->91124 91122 415596 91152 417f23 67 API calls __getptd_noexit 91122->91152 91123 4155c4 91134 415965 91123->91134 91124->91122 91124->91123 91127 41559b 91153 417ebb 6 API calls 2 library calls 91127->91153 91133 4155ab __fcloseall 91133->90981 91135 415977 91134->91135 91136 415999 EnterCriticalSection 91134->91136 91135->91136 91138 41597f 91135->91138 91137 4155cc 91136->91137 91140 4154f2 91137->91140 91139 418407 __lock 67 API calls 91138->91139 91139->91137 91141 415512 91140->91141 91142 415502 91140->91142 91147 415524 91141->91147 91155 4152e7 91141->91155 91209 417f23 67 API calls __getptd_noexit 91142->91209 91146 415507 91154 4155f7 LeaveCriticalSection LeaveCriticalSection _fseek 91146->91154 91172 41486c 91147->91172 91152->91127 91154->91133 91156 41531a 91155->91156 91157 4152fa 91155->91157 91158 41453a __fileno 67 API calls 91156->91158 91210 417f23 67 API calls __getptd_noexit 91157->91210 91160 415320 91158->91160 91163 41efd4 __locking 71 API calls 91160->91163 91161 4152ff 91211 417ebb 6 API calls 2 library calls 91161->91211 91164 415335 91163->91164 91165 4153a9 91164->91165 91167 415364 91164->91167 91171 41530f 91164->91171 91212 417f23 67 API calls __getptd_noexit 91165->91212 91168 41efd4 __locking 71 API calls 91167->91168 91167->91171 91169 415404 91168->91169 91170 41efd4 __locking 71 API calls 91169->91170 91169->91171 91170->91171 91171->91147 91173 4148a7 91172->91173 91174 414885 91172->91174 91178 41453a 91173->91178 91174->91173 91175 41453a __fileno 67 API calls 91174->91175 91176 4148a0 91175->91176 91213 41c3cf 101 API calls 6 library calls 91176->91213 91179 41455e 91178->91179 91180 414549 91178->91180 91184 41efd4 91179->91184 91214 417f23 67 API calls __getptd_noexit 91180->91214 91182 41454e 91215 417ebb 6 API calls 2 library calls 91182->91215 91185 41efe0 __fcloseall 91184->91185 91186 41f003 91185->91186 91187 41efe8 91185->91187 91189 41f011 91186->91189 91192 41f052 91186->91192 91236 417f36 67 API calls __getptd_noexit 91187->91236 91238 417f36 67 API calls __getptd_noexit 91189->91238 91190 41efed 91237 417f23 67 API calls __getptd_noexit 91190->91237 91216 41ba3b 91192->91216 91194 41f016 91239 417f23 67 API calls __getptd_noexit 91194->91239 91197 41f01d 91240 417ebb 6 API calls 2 library calls 91197->91240 91198 41f058 91200 41f065 91198->91200 91201 41f07b 91198->91201 91226 41ef5f 91200->91226 91241 417f23 67 API calls __getptd_noexit 91201->91241 91202 41eff5 __fcloseall 91202->91146 91205 41f073 91243 41f0a6 LeaveCriticalSection __unlock_fhandle 91205->91243 91206 41f080 91242 417f36 67 API calls __getptd_noexit 91206->91242 91209->91146 91210->91161 91212->91171 91213->91173 91214->91182 91217 41ba47 __fcloseall 91216->91217 91218 41baa2 91217->91218 91219 418407 __lock 67 API calls 91217->91219 91220 41bac4 __fcloseall 91218->91220 91221 41baa7 EnterCriticalSection 91218->91221 91222 41ba73 91219->91222 91220->91198 91221->91220 91223 4189e6 __ioinit InitializeCriticalSectionAndSpinCount 91222->91223 91225 41ba8a 91222->91225 91223->91225 91224 41bad2 ___lock_fhandle LeaveCriticalSection 91224->91218 91225->91224 91227 41b9c4 __chsize_nolock 67 API calls 91226->91227 91228 41ef6e 91227->91228 91229 41ef84 SetFilePointer 91228->91229 91230 41ef74 91228->91230 91232 41efa3 91229->91232 91233 41ef9b GetLastError 91229->91233 91231 417f23 ___wstrgtold12_l 67 API calls 91230->91231 91235 41ef79 91231->91235 91234 417f49 __dosmaperr 67 API calls 91232->91234 91232->91235 91233->91232 91234->91235 91235->91205 91236->91190 91237->91202 91238->91194 91239->91197 91241->91206 91242->91205 91243->91202 91245 414e31 91244->91245 91246 414e4d 91244->91246 91290 417f23 67 API calls __getptd_noexit 91245->91290 91248 414e46 91246->91248 91249 41486c __flush 101 API calls 91246->91249 91262 414f08 LeaveCriticalSection LeaveCriticalSection _fseek 91248->91262 91251 414e59 91249->91251 91250 414e36 91291 417ebb 6 API calls 2 library calls 91250->91291 91263 41e680 91251->91263 91255 41453a __fileno 67 API calls 91256 414e67 91255->91256 91267 41e5b3 91256->91267 91258 414e6d 91258->91248 91259 413a88 __getptd_noexit 67 API calls 91258->91259 91259->91248 91260->90992 91262->90996 91264 41e690 91263->91264 91266 414e61 91263->91266 91265 413a88 __getptd_noexit 67 API calls 91264->91265 91264->91266 91265->91266 91266->91255 91268 41e5bf __fcloseall 91267->91268 91269 41e5c7 91268->91269 91271 41e5e2 91268->91271 91307 417f36 67 API calls __getptd_noexit 91269->91307 91270 41e5f0 91309 417f36 67 API calls __getptd_noexit 91270->91309 91271->91270 91276 41e631 91271->91276 91274 41e5cc 91308 417f23 67 API calls __getptd_noexit 91274->91308 91275 41e5f5 91310 417f23 67 API calls __getptd_noexit 91275->91310 91279 41ba3b ___lock_fhandle 68 API calls 91276->91279 91281 41e637 91279->91281 91280 41e5fc 91311 417ebb 6 API calls 2 library calls 91280->91311 91283 41e652 91281->91283 91284 41e644 91281->91284 91312 417f23 67 API calls __getptd_noexit 91283->91312 91292 41e517 91284->91292 91286 41e5d4 __fcloseall 91286->91258 91288 41e64c 91313 41e676 LeaveCriticalSection __unlock_fhandle 91288->91313 91290->91250 91314 41b9c4 91292->91314 91294 41e57d 91327 41b93e 68 API calls 2 library calls 91294->91327 91296 41e527 91296->91294 91297 41e55b 91296->91297 91300 41b9c4 __chsize_nolock 67 API calls 91296->91300 91297->91294 91298 41b9c4 __chsize_nolock 67 API calls 91297->91298 91301 41e567 CloseHandle 91298->91301 91299 41e585 91302 41e5a7 91299->91302 91328 417f49 67 API calls 3 library calls 91299->91328 91303 41e552 91300->91303 91301->91294 91304 41e573 GetLastError 91301->91304 91302->91288 91306 41b9c4 __chsize_nolock 67 API calls 91303->91306 91304->91294 91306->91297 91307->91274 91308->91286 91309->91275 91310->91280 91312->91288 91313->91286 91315 41b9d1 91314->91315 91316 41b9e9 91314->91316 91317 417f36 __chsize_nolock 67 API calls 91315->91317 91319 417f36 __chsize_nolock 67 API calls 91316->91319 91324 41ba2e 91316->91324 91318 41b9d6 91317->91318 91320 417f23 ___wstrgtold12_l 67 API calls 91318->91320 91321 41ba17 91319->91321 91322 41b9de 91320->91322 91323 417f23 ___wstrgtold12_l 67 API calls 91321->91323 91322->91296 91325 41ba1e 91323->91325 91324->91296 91326 417ebb ___wstrgtold12_l 6 API calls 91325->91326 91326->91324 91327->91299 91328->91302 91330 415126 __fcloseall 91329->91330 91331 41516f 91330->91331 91332 415164 __fcloseall 91330->91332 91334 41513a _memset 91330->91334 91333 415965 __lock_file 68 API calls 91331->91333 91332->91001 91335 415177 91333->91335 91358 417f23 67 API calls __getptd_noexit 91334->91358 91342 414f10 91335->91342 91338 415154 91359 417ebb 6 API calls 2 library calls 91338->91359 91346 414f2e _memset 91342->91346 91349 414f4c 91342->91349 91343 414f37 91411 417f23 67 API calls __getptd_noexit 91343->91411 91345 414f3c 91412 417ebb 6 API calls 2 library calls 91345->91412 91346->91343 91346->91349 91350 414f8b 91346->91350 91360 4151a6 LeaveCriticalSection LeaveCriticalSection _fseek 91349->91360 91350->91349 91351 4150d5 _memset 91350->91351 91352 4150a9 _memset 91350->91352 91353 41453a __fileno 67 API calls 91350->91353 91361 41ed9e 91350->91361 91391 41e6b1 91350->91391 91413 41ee9b 67 API calls 3 library calls 91350->91413 91415 417f23 67 API calls __getptd_noexit 91351->91415 91414 417f23 67 API calls __getptd_noexit 91352->91414 91353->91350 91358->91338 91360->91332 91362 41edaa __fcloseall 91361->91362 91363 41edb2 91362->91363 91364 41edcd 91362->91364 91485 417f36 67 API calls __getptd_noexit 91363->91485 91365 41eddb 91364->91365 91370 41ee1c 91364->91370 91487 417f36 67 API calls __getptd_noexit 91365->91487 91368 41edb7 91486 417f23 67 API calls __getptd_noexit 91368->91486 91369 41ede0 91488 417f23 67 API calls __getptd_noexit 91369->91488 91373 41ee29 91370->91373 91374 41ee3d 91370->91374 91490 417f36 67 API calls __getptd_noexit 91373->91490 91375 41ba3b ___lock_fhandle 68 API calls 91374->91375 91378 41ee43 91375->91378 91376 41ede7 91489 417ebb 6 API calls 2 library calls 91376->91489 91380 41ee50 91378->91380 91381 41ee66 91378->91381 91379 41ee2e 91491 417f23 67 API calls __getptd_noexit 91379->91491 91416 41e7dc 91380->91416 91492 417f23 67 API calls __getptd_noexit 91381->91492 91384 41edbf __fcloseall 91384->91350 91387 41ee5e 91494 41ee91 LeaveCriticalSection __unlock_fhandle 91387->91494 91388 41ee6b 91493 417f36 67 API calls __getptd_noexit 91388->91493 91392 41e6c1 91391->91392 91396 41e6de 91391->91396 91498 417f23 67 API calls __getptd_noexit 91392->91498 91394 41e6c6 91499 417ebb 6 API calls 2 library calls 91394->91499 91397 41e713 91396->91397 91403 41e6d6 91396->91403 91495 423600 91396->91495 91399 41453a __fileno 67 API calls 91397->91399 91400 41e727 91399->91400 91401 41ed9e __read 79 API calls 91400->91401 91402 41e72e 91401->91402 91402->91403 91404 41453a __fileno 67 API calls 91402->91404 91403->91350 91405 41e751 91404->91405 91405->91403 91406 41453a __fileno 67 API calls 91405->91406 91407 41e75d 91406->91407 91407->91403 91408 41453a __fileno 67 API calls 91407->91408 91409 41e769 91408->91409 91410 41453a __fileno 67 API calls 91409->91410 91410->91403 91411->91345 91413->91350 91414->91345 91415->91345 91417 41e813 91416->91417 91418 41e7f8 91416->91418 91419 41e822 91417->91419 91421 41e849 91417->91421 91420 417f36 __chsize_nolock 67 API calls 91418->91420 91422 417f36 __chsize_nolock 67 API calls 91419->91422 91423 41e7fd 91420->91423 91425 41e868 91421->91425 91436 41e87c 91421->91436 91424 41e827 91422->91424 91426 417f23 ___wstrgtold12_l 67 API calls 91423->91426 91428 417f23 ___wstrgtold12_l 67 API calls 91424->91428 91429 417f36 __chsize_nolock 67 API calls 91425->91429 91437 41e805 91426->91437 91427 41e8d4 91431 417f36 __chsize_nolock 67 API calls 91427->91431 91430 41e82e 91428->91430 91432 41e86d 91429->91432 91433 417ebb ___wstrgtold12_l 6 API calls 91430->91433 91434 41e8d9 91431->91434 91435 417f23 ___wstrgtold12_l 67 API calls 91432->91435 91433->91437 91438 417f23 ___wstrgtold12_l 67 API calls 91434->91438 91439 41e874 91435->91439 91436->91427 91436->91437 91440 41e8b0 91436->91440 91442 41e8f5 91436->91442 91437->91387 91438->91439 91443 417ebb ___wstrgtold12_l 6 API calls 91439->91443 91440->91427 91441 41e8bb ReadFile 91440->91441 91447 41ed62 GetLastError 91441->91447 91448 41e9e7 91441->91448 91445 416fb6 __malloc_crt 67 API calls 91442->91445 91443->91437 91446 41e90b 91445->91446 91451 41e931 91446->91451 91452 41e913 91446->91452 91449 41ebe8 91447->91449 91450 41ed6f 91447->91450 91448->91447 91455 41e9fb 91448->91455 91459 417f49 __dosmaperr 67 API calls 91449->91459 91464 41eb6d 91449->91464 91453 417f23 ___wstrgtold12_l 67 API calls 91450->91453 91456 423462 __lseeki64_nolock 69 API calls 91451->91456 91454 417f23 ___wstrgtold12_l 67 API calls 91452->91454 91457 41ed74 91453->91457 91458 41e918 91454->91458 91455->91464 91470 41ec2d 91455->91470 91472 41ea17 91455->91472 91460 41e93d 91456->91460 91461 417f36 __chsize_nolock 67 API calls 91457->91461 91462 417f36 __chsize_nolock 67 API calls 91458->91462 91459->91464 91460->91441 91461->91464 91462->91437 91463 413a88 __getptd_noexit 67 API calls 91463->91437 91464->91437 91464->91463 91465 41ea7d ReadFile 91469 41ea9b GetLastError 91465->91469 91476 41eaa5 91465->91476 91466 41eca5 ReadFile 91467 41ecc4 GetLastError 91466->91467 91477 41ecce 91466->91477 91467->91470 91467->91477 91468 41ebbe MultiByteToWideChar 91468->91464 91471 41ebe2 GetLastError 91468->91471 91469->91472 91469->91476 91470->91464 91470->91466 91471->91449 91472->91465 91473 41eafa 91472->91473 91473->91464 91474 41eb75 91473->91474 91475 41eb68 91473->91475 91481 41eb32 91473->91481 91474->91481 91482 41ebac 91474->91482 91478 417f23 ___wstrgtold12_l 67 API calls 91475->91478 91476->91472 91479 423462 __lseeki64_nolock 69 API calls 91476->91479 91477->91470 91480 423462 __lseeki64_nolock 69 API calls 91477->91480 91478->91464 91479->91476 91480->91477 91481->91468 91483 423462 __lseeki64_nolock 69 API calls 91482->91483 91484 41ebbb 91483->91484 91484->91468 91485->91368 91486->91384 91487->91369 91488->91376 91490->91379 91491->91376 91492->91388 91493->91387 91494->91384 91496 416fb6 __malloc_crt 67 API calls 91495->91496 91497 423615 91496->91497 91497->91397 91498->91394 91503 414cef GetSystemTimeAsFileTime __aulldiv 91500->91503 91502 4431ef 91502->91004 91503->91502 91504->91011 91506->91017 91512 4523e1 _wcscpy 91507->91512 91508 4151b0 81 API calls __fread_nolock 91508->91512 91509 44afdc GetSystemTimeAsFileTime 91509->91512 91510 452553 91510->90926 91510->90927 91511 41557c 105 API calls _fseek 91511->91512 91512->91508 91512->91509 91512->91510 91512->91511 91514 44b1b4 91513->91514 91515 44b1a6 91513->91515 91517 44b1ca 91514->91517 91518 414e06 138 API calls 91514->91518 91519 44b1c2 91514->91519 91516 414e06 138 API calls 91515->91516 91516->91514 91548 4352d1 81 API calls 2 library calls 91517->91548 91520 44b2c1 91518->91520 91519->90954 91520->91517 91523 44b2cf 91520->91523 91522 44b20d 91524 44b211 91522->91524 91525 44b23b 91522->91525 91526 44b2dc 91523->91526 91528 414e94 __fcloseall 106 API calls 91523->91528 91527 44b21e 91524->91527 91530 414e94 __fcloseall 106 API calls 91524->91530 91549 43526e 91525->91549 91526->90954 91531 44b22e 91527->91531 91533 414e94 __fcloseall 106 API calls 91527->91533 91528->91526 91530->91527 91531->90954 91532 44b242 91534 44b270 91532->91534 91535 44b248 91532->91535 91533->91531 91559 44b0af 111 API calls 91534->91559 91537 44b255 91535->91537 91540 414e94 __fcloseall 106 API calls 91535->91540 91538 44b265 91537->91538 91541 414e94 __fcloseall 106 API calls 91537->91541 91538->90954 91539 44b276 91560 43522c 67 API calls __getptd_noexit 91539->91560 91540->91537 91541->91538 91543 44b27c 91544 414e94 __fcloseall 106 API calls 91543->91544 91546 44b289 91543->91546 91544->91546 91545 414e94 __fcloseall 106 API calls 91547 44b299 91545->91547 91546->91545 91546->91547 91547->90954 91548->91522 91550 4138ba _malloc 67 API calls 91549->91550 91551 43527d 91550->91551 91552 4138ba _malloc 67 API calls 91551->91552 91553 43528d 91552->91553 91554 4138ba _malloc 67 API calls 91553->91554 91555 43529d 91554->91555 91557 4352bc 91555->91557 91561 43522c 67 API calls __getptd_noexit 91555->91561 91557->91532 91558 4352c8 91558->91532 91559->91539 91560->91543 91561->91558 91562->90832 91564 410148 SHGetDesktopFolder 91563->91564 91567 4101a3 _wcscpy 91563->91567 91565 41015a _wcscpy 91564->91565 91564->91567 91566 41018a SHGetPathFromIDListW 91565->91566 91565->91567 91566->91567 91567->90835 91568->90838 91570 40f5e0 152 API calls 91569->91570 91571 40f417 91570->91571 91572 42ca37 91571->91572 91574 40f42c 91571->91574 91575 42ca1f 91571->91575 91573 452574 140 API calls 91572->91573 91576 42ca50 91573->91576 91607 4037e0 139 API calls 7 library calls 91574->91607 91608 43717f 110 API calls _printf 91575->91608 91579 42ca76 91576->91579 91580 42ca54 91576->91580 91584 41171a 75 API calls 91579->91584 91583 434fe1 106 API calls 91580->91583 91581 40f446 91581->90836 91582 42ca2d 91582->91572 91585 42ca5e 91583->91585 91599 42cacc ctype 91584->91599 91609 43717f 110 API calls _printf 91585->91609 91587 42ca6c 91587->91579 91588 42ccc3 91589 413a88 __getptd_noexit 67 API calls 91588->91589 91590 42cccd 91589->91590 91591 434fe1 106 API calls 91590->91591 91592 42ccda 91591->91592 91596 401b70 75 API calls 91596->91599 91599->91588 91599->91596 91600 402cc0 75 API calls 2 library calls 91599->91600 91601 4026a0 91599->91601 91610 445051 75 API calls _memcpy_s 91599->91610 91611 44c80c 87 API calls 3 library calls 91599->91611 91612 44b408 75 API calls 91599->91612 91600->91599 91603 4026af 91601->91603 91604 40276b 91601->91604 91602 4026ee ctype 91602->91604 91606 41171a 75 API calls 91602->91606 91603->91602 91603->91604 91605 41171a 75 API calls 91603->91605 91604->91599 91605->91602 91606->91602 91607->91581 91608->91582 91609->91587 91610->91599 91611->91599 91612->91599 91613->90846 91614->90845 90101 3fbe4f8 90116 3fbc148 90101->90116 90103 3fbe5f4 90119 3fbe3e8 90103->90119 90105 3fbe61d CreateFileW 90107 3fbe66f 90105->90107 90108 3fbe674 90105->90108 90108->90107 90109 3fbe68b VirtualAlloc 90108->90109 90109->90107 90110 3fbe6a9 ReadFile 90109->90110 90110->90107 90111 3fbe6c4 90110->90111 90112 3fbd3e8 13 API calls 90111->90112 90113 3fbe6f7 90112->90113 90114 3fbe71a ExitProcess 90113->90114 90115 3fbe478 CreateProcessW 90113->90115 90114->90107 90115->90114 90122 3fbf628 GetPEB 90116->90122 90118 3fbc7d3 90118->90103 90120 3fbe3f1 Sleep 90119->90120 90121 3fbe3ff 90120->90121 90123 3fbf652 90122->90123 90123->90118 90124 444343 90127 444326 90124->90127 90126 44434e WriteFile 90128 444340 90127->90128 90129 4442c7 90127->90129 90128->90126 90134 40e190 SetFilePointerEx 90129->90134 90131 4442e0 SetFilePointerEx 90135 40e190 SetFilePointerEx 90131->90135 90133 4442ff 90133->90126 90134->90131 90135->90133 91615 431914 91616 431920 91615->91616 91617 431928 91616->91617 91618 43193d 91616->91618 91879 45e62e 116 API calls 3 library calls 91617->91879 91880 47f2b4 174 API calls 91618->91880 91621 43194a 91659 4095b0 ctype 91621->91659 91881 45e62e 116 API calls 3 library calls 91621->91881 91622 409708 91625 4097af 91625->91622 91866 40d590 VariantClear 91625->91866 91627 4315b8 WaitForSingleObject 91629 4315d6 GetExitCodeProcess CloseHandle 91627->91629 91627->91659 91870 40d590 VariantClear 91629->91870 91630 431623 Sleep 91633 43163b timeGetTime 91630->91633 91653 409894 91630->91653 91633->91653 91636 40986e Sleep 91638 409880 timeGetTime 91636->91638 91636->91653 91637 4098f1 TranslateMessage DispatchMessageW 91637->91659 91638->91653 91639 431673 CloseHandle 91639->91653 91640 40d590 VariantClear 91640->91653 91641 43170c GetExitCodeProcess CloseHandle 91641->91653 91642 46e641 134 API calls 91642->91653 91644 46dd22 133 API calls 91644->91653 91647 431781 Sleep 91647->91659 91650 45e62e 116 API calls 91650->91659 91653->91639 91653->91640 91653->91641 91653->91642 91653->91644 91653->91647 91657 4092c0 VariantClear 91653->91657 91653->91659 91867 447e59 75 API calls 91653->91867 91868 453b07 77 API calls 91653->91868 91869 4646a2 76 API calls 91653->91869 91871 444233 88 API calls _wcslen 91653->91871 91872 457509 VariantClear 91653->91872 91873 404120 91653->91873 91877 4717e3 VariantClear 91653->91877 91878 436272 6 API calls 91653->91878 91656 4319c9 VariantClear 91656->91659 91657->91653 91658 4092c0 VariantClear 91658->91659 91659->91622 91659->91625 91659->91627 91659->91630 91659->91636 91659->91637 91659->91650 91659->91653 91659->91656 91659->91658 91661 40b380 91659->91661 91685 409340 91659->91685 91718 409030 91659->91718 91732 40d300 91659->91732 91737 40d320 91659->91737 91743 409a40 91659->91743 91882 40e380 VariantClear ctype 91659->91882 91662 40b3a5 91661->91662 91663 40b53d 91661->91663 91664 430a99 91662->91664 91669 40b3b6 91662->91669 91883 45e62e 116 API calls 3 library calls 91663->91883 91884 45e62e 116 API calls 3 library calls 91664->91884 91667 40b528 91667->91659 91668 430aae 91672 4092c0 VariantClear 91668->91672 91669->91668 91673 40b3f2 91669->91673 91684 40b4fd ctype 91669->91684 91671 430dc9 91671->91671 91672->91667 91674 40b429 91673->91674 91675 430ae9 VariantClear 91673->91675 91676 40b476 ctype 91673->91676 91683 40b43b ctype 91674->91683 91885 40e380 VariantClear ctype 91674->91885 91675->91683 91677 40b4eb 91676->91677 91679 430d08 ctype 91676->91679 91677->91684 91886 40e380 VariantClear ctype 91677->91886 91678 430d41 VariantClear 91678->91684 91679->91678 91679->91684 91681 41171a 75 API calls 91681->91676 91683->91676 91683->91681 91684->91667 91887 45e62e 116 API calls 3 library calls 91684->91887 91686 409386 91685->91686 91690 409395 91685->91690 91888 4042f0 75 API calls __cinit 91686->91888 91689 42fba9 91892 45e62e 116 API calls 3 library calls 91689->91892 91690->91689 91692 42fc07 91690->91692 91693 42fc85 91690->91693 91697 42fd4f 91690->91697 91698 42fcd8 91690->91698 91704 42fd39 91690->91704 91705 40946f 91690->91705 91707 4094c1 91690->91707 91710 40947b 91690->91710 91714 4092c0 VariantClear 91690->91714 91717 409484 ctype 91690->91717 91891 453155 75 API calls 91690->91891 91893 40c620 118 API calls 91690->91893 91895 45e62e 116 API calls 3 library calls 91690->91895 91894 45e62e 116 API calls 3 library calls 91692->91894 91896 4781ae 140 API calls 91693->91896 91700 4092c0 VariantClear 91697->91700 91898 47f2b4 174 API calls 91698->91898 91699 42fc9c 91699->91717 91897 45e62e 116 API calls 3 library calls 91699->91897 91700->91717 91900 45e62e 116 API calls 3 library calls 91704->91900 91889 409210 VariantClear 91705->91889 91706 42fce9 91706->91717 91899 45e62e 116 API calls 3 library calls 91706->91899 91707->91717 91890 404260 76 API calls 91707->91890 91712 4092c0 VariantClear 91710->91712 91712->91717 91714->91690 91715 4094e1 91716 4092c0 VariantClear 91715->91716 91716->91717 91717->91659 91901 409110 117 API calls 91718->91901 91720 42ceb6 91911 410ae0 VariantClear ctype 91720->91911 91722 42cebf 91723 42cea9 91910 45e62e 116 API calls 3 library calls 91723->91910 91725 40906e 91725->91720 91725->91723 91726 4090a4 91725->91726 91902 404160 91726->91902 91729 4090f0 ctype 91729->91659 91730 4092c0 VariantClear 91731 4090be ctype 91730->91731 91731->91729 91731->91730 91734 4292e3 91732->91734 91736 40d30c 91732->91736 91733 429323 91733->91659 91734->91733 91735 4292fd TranslateAcceleratorW 91734->91735 91735->91736 91736->91659 91738 4296d0 91737->91738 91742 40d32f 91737->91742 91738->91659 91739 42972a IsDialogMessageW 91740 40d33c 91739->91740 91739->91742 91740->91659 91742->91739 91742->91740 92042 4340ec GetClassLongW 91742->92042 91744 409a66 _wcslen 91743->91744 91745 41171a 75 API calls 91744->91745 91805 40aade _memcpy_s ctype 91744->91805 91746 409a9c _memcpy_s 91745->91746 91748 41171a 75 API calls 91746->91748 91750 409abd 91748->91750 91749 42cee9 91751 41171a 75 API calls 91749->91751 91752 409aeb CharUpperBuffW 91750->91752 91755 409b09 ctype 91750->91755 91750->91805 91754 42cf10 _memcpy_s 91751->91754 91752->91755 92076 45e62e 116 API calls 3 library calls 91754->92076 91791 409b88 ctype 91755->91791 92045 47d10e 150 API calls 91755->92045 91757 4092c0 VariantClear 91758 42e5e0 91757->91758 92077 410ae0 VariantClear ctype 91758->92077 91760 42e5f2 91761 409e4a 91761->91754 91764 41171a 75 API calls 91761->91764 91768 409ea4 91761->91768 91762 40aa5b 91765 41171a 75 API calls 91762->91765 91763 41171a 75 API calls 91763->91791 91764->91768 91782 40aa81 _memcpy_s ctype 91765->91782 91767 409ed0 91771 42d50d 91767->91771 91814 409ef8 _memcpy_s ctype 91767->91814 92055 40b800 VariantClear VariantClear ctype 91767->92055 91768->91767 91769 41171a 75 API calls 91768->91769 91770 42d480 91769->91770 91772 42d491 91770->91772 92051 44b3f6 75 API calls 91770->92051 91774 42d527 91771->91774 92056 40b800 VariantClear VariantClear ctype 91771->92056 92052 40df50 75 API calls 91772->92052 91774->91814 92057 40e2e0 VariantClear ctype 91774->92057 91775 42d195 VariantClear 91775->91791 91776 4092c0 VariantClear 91776->91791 91779 40a415 91786 41171a 75 API calls 91779->91786 91780 42db5c 92062 4721e5 VariantClear 91780->92062 91790 41171a 75 API calls 91782->91790 91802 40a41c 91786->91802 91788 42db96 92063 45e62e 116 API calls 3 library calls 91788->92063 91790->91805 91791->91754 91791->91761 91791->91762 91791->91763 91791->91775 91791->91776 91791->91782 91794 42d128 91791->91794 91795 42d20c 91791->91795 91803 42dbb9 91791->91803 92046 40c3e0 75 API calls 91791->92046 92047 40c620 118 API calls 91791->92047 92049 40be00 75 API calls 2 library calls 91791->92049 92050 40e380 VariantClear ctype 91791->92050 91792 42d4a6 92053 4530b3 75 API calls 91792->92053 91797 4092c0 VariantClear 91794->91797 91795->91659 91796 42d4d7 92054 4530b3 75 API calls 91796->92054 91801 42d131 91797->91801 92048 410ae0 VariantClear ctype 91801->92048 91807 40a481 91802->91807 92064 40c8a0 VariantClear ctype 91802->92064 91803->91757 92044 401380 75 API calls 91805->92044 91816 40a4ed 91807->91816 91817 42dc1e VariantClear 91807->91817 91842 40a534 _memcpy_s ctype 91807->91842 91808 41171a 75 API calls 91808->91814 91810 402cc0 75 API calls 91810->91814 91811 44b3f6 75 API calls 91811->91814 91812 40aa22 ctype 91812->91659 91813 4092c0 VariantClear 91813->91842 91814->91780 91814->91788 91814->91805 91814->91808 91814->91810 91814->91811 91815 411421 74 API calls __cinit 91814->91815 91829 40a3a7 91814->91829 91830 40a053 91814->91830 92058 45ee98 75 API calls 91814->92058 92059 4019e0 76 API calls 91814->92059 92060 404260 76 API calls 91814->92060 92061 409210 VariantClear 91814->92061 91815->91814 91821 40a4ff ctype 91816->91821 92065 40e380 VariantClear ctype 91816->92065 91817->91821 91820 41171a 75 API calls 91820->91842 91821->91820 91821->91842 91825 42deb6 VariantClear 91825->91842 91826 40a73c 91828 42e237 91826->91828 91835 40a76b 91826->91835 91827 40e380 VariantClear 91827->91842 92069 46e709 VariantClear VariantClear ctype 91828->92069 91829->91779 91829->91780 91830->91659 91831 42dfe9 VariantClear 91831->91842 91832 42df47 VariantClear 91832->91842 91833 40a7a2 91846 40a7ad ctype 91833->91846 92070 40b800 VariantClear VariantClear ctype 91833->92070 91835->91833 91857 40a800 ctype 91835->91857 92043 40b800 VariantClear VariantClear ctype 91835->92043 91838 41171a 75 API calls 91838->91842 91839 41171a 75 API calls 91844 42dd10 VariantInit VariantCopy 91839->91844 91840 40a8b0 91852 40a8c2 ctype 91840->91852 92072 40e380 VariantClear ctype 91840->92072 91841 42e312 91843 42e337 VariantClear 91841->91843 91841->91852 91842->91813 91842->91825 91842->91826 91842->91827 91842->91828 91842->91831 91842->91832 91842->91838 91842->91839 92066 46e9cd 75 API calls 91842->92066 92067 409210 VariantClear 91842->92067 92068 44cc6c VariantClear ctype 91842->92068 91843->91852 91844->91842 91848 42dd30 VariantClear 91844->91848 91847 40a7ee 91846->91847 91850 42e2a7 VariantClear 91846->91850 91846->91857 91847->91857 92071 40e380 VariantClear ctype 91847->92071 91848->91842 91849 42e3b2 91854 42e3da VariantClear 91849->91854 91861 40a91a ctype 91849->91861 91850->91857 91852->91849 91853 40a908 91852->91853 91853->91861 92073 40e380 VariantClear ctype 91853->92073 91854->91861 91856 42e47f 91860 42e4a3 VariantClear 91856->91860 91865 40a957 ctype 91856->91865 91857->91840 91857->91841 91858 40a945 91858->91865 92074 40e380 VariantClear ctype 91858->92074 91860->91865 91861->91856 91861->91858 91863 42e559 VariantClear 91863->91865 91865->91812 91865->91863 92075 40e380 VariantClear ctype 91865->92075 91866->91622 91867->91653 91868->91653 91869->91653 91870->91653 91871->91653 91872->91653 91874 40412e 91873->91874 91875 4092c0 VariantClear 91874->91875 91876 404138 91875->91876 91876->91647 91877->91653 91878->91653 91879->91659 91880->91621 91881->91659 91882->91659 91883->91664 91884->91668 91885->91683 91886->91684 91887->91671 91888->91690 91889->91710 91890->91715 91891->91690 91892->91717 91893->91690 91894->91717 91895->91690 91896->91699 91897->91717 91898->91706 91899->91717 91900->91697 91901->91725 91903 4092c0 VariantClear 91902->91903 91904 40416e 91903->91904 91905 404120 VariantClear 91904->91905 91906 40419b 91905->91906 91912 40efe0 91906->91912 91920 4734b7 91906->91920 91907 4041c6 91907->91720 91907->91731 91910->91720 91911->91722 91913 40eff5 CreateFileW 91912->91913 91914 4299bf 91912->91914 91916 40f017 91913->91916 91915 4299c4 CreateFileW 91914->91915 91914->91916 91915->91916 91917 4299ea 91915->91917 91916->91907 91962 40e0d0 SetFilePointerEx SetFilePointerEx 91917->91962 91919 4299f5 91919->91916 91921 453063 111 API calls 91920->91921 91922 4734d7 91921->91922 91923 473545 91922->91923 91924 47350c 91922->91924 91963 463c42 91923->91963 91925 4092c0 VariantClear 91924->91925 91930 473514 91925->91930 91927 473558 91928 47355c 91927->91928 91944 473595 91927->91944 91931 4092c0 VariantClear 91928->91931 91929 473616 91976 463d7e 91929->91976 91930->91907 91940 473564 91931->91940 91933 453063 111 API calls 91933->91944 91934 473622 91935 473697 91934->91935 91936 47362c 91934->91936 92008 457838 91935->92008 91939 4092c0 VariantClear 91936->91939 91942 473634 91939->91942 91940->91907 91942->91907 91943 473655 91946 4092c0 VariantClear 91943->91946 91944->91929 91944->91933 91944->91943 92020 462f5a 87 API calls __wcsicoll 91944->92020 91957 47365d 91946->91957 91948 4736b0 92021 45e62e 116 API calls 3 library calls 91948->92021 91949 4736c9 92022 40e7e0 76 API calls 91949->92022 91952 4736ba GetCurrentProcess TerminateProcess 91952->91949 91953 4736db 91959 4736ff 91953->91959 92023 40d030 76 API calls 91953->92023 91955 4736f1 92024 46b945 134 API calls 2 library calls 91955->92024 91957->91907 91961 473731 91959->91961 92025 40d030 76 API calls 91959->92025 92026 46b945 134 API calls 2 library calls 91959->92026 91961->91907 91962->91919 92027 45335b 76 API calls 91963->92027 91965 463c5d 92028 442c52 80 API calls _wcslen 91965->92028 91967 463c72 91969 40c060 75 API calls 91967->91969 91975 463cac 91967->91975 91970 463c8e 91969->91970 92029 4608ce 75 API calls _memcpy_s 91970->92029 91972 463ca4 91973 40c740 75 API calls 91972->91973 91973->91975 91974 463cf7 91974->91927 91975->91974 92030 462f5a 87 API calls __wcsicoll 91975->92030 91977 453063 111 API calls 91976->91977 91978 463d99 91977->91978 91979 463de0 91978->91979 91980 463dca 91978->91980 92032 40c760 78 API calls 91979->92032 92031 453081 111 API calls 91980->92031 91983 463de7 91989 463e19 91983->91989 92033 40c760 78 API calls 91983->92033 91984 463dd0 LoadLibraryW 91985 463e09 91984->91985 91987 463e3e 91985->91987 91985->91989 91990 463e4e 91987->91990 91991 463e7b 91987->91991 91988 463dfb 91988->91989 92034 40c760 78 API calls 91988->92034 91989->91934 92035 40d500 75 API calls 91990->92035 92037 40c760 78 API calls 91991->92037 91995 463e57 92036 45efe7 77 API calls ctype 91995->92036 91996 463e82 GetProcAddress 91998 463e90 91996->91998 91998->91989 92000 463e79 91998->92000 91999 463e62 GetProcAddress 91999->92000 92000->91998 92038 403470 75 API calls _memcpy_s 92000->92038 92002 463eb4 92039 40d500 75 API calls 92002->92039 92004 463ebd 92040 45efe7 77 API calls ctype 92004->92040 92006 463ec8 GetProcAddress 92041 401330 ctype 92006->92041 92009 457a4c 92008->92009 92014 45785f _strcat _wcslen _wcscpy ctype 92008->92014 92016 410d40 92009->92016 92010 40c760 78 API calls 92010->92014 92011 443576 78 API calls 92011->92014 92012 453081 111 API calls 92012->92014 92013 4138ba 67 API calls _malloc 92013->92014 92014->92009 92014->92010 92014->92011 92014->92012 92014->92013 92015 40f580 77 API calls 92014->92015 92015->92014 92018 410d55 92016->92018 92017 410ded VirtualProtect 92019 410dbb 92017->92019 92018->92017 92018->92019 92019->91948 92019->91949 92020->91944 92021->91952 92022->91953 92023->91955 92024->91959 92025->91959 92026->91959 92027->91965 92028->91967 92029->91972 92030->91974 92031->91984 92032->91983 92033->91988 92034->91985 92035->91995 92036->91999 92037->91996 92038->92002 92039->92004 92040->92006 92041->91989 92042->91742 92043->91833 92044->91749 92045->91755 92046->91791 92047->91791 92048->91812 92049->91791 92050->91791 92051->91772 92052->91792 92053->91796 92054->91767 92055->91771 92056->91774 92057->91814 92058->91814 92059->91814 92060->91814 92061->91814 92062->91788 92063->91803 92064->91802 92065->91821 92066->91842 92067->91842 92068->91842 92069->91833 92070->91846 92071->91857 92072->91852 92073->91861 92074->91865 92075->91865 92076->91803 92077->91760 90136 46d22f 90139 46d098 90136->90139 90138 46d241 90140 46d0b5 90139->90140 90141 46d115 90140->90141 90142 46d0b9 90140->90142 90210 45c216 78 API calls 90141->90210 90187 41171a 90142->90187 90146 46d126 90147 46d0f8 90146->90147 90154 46d142 90146->90154 90206 4092c0 90147->90206 90148 46d0cc 90200 453063 90148->90200 90152 46d0fd 90152->90138 90155 46d1c8 90154->90155 90157 46d158 90154->90157 90216 4676a3 78 API calls 90155->90216 90160 453063 111 API calls 90157->90160 90158 46d0ea 90158->90154 90161 46d0ee 90158->90161 90170 46d15e 90160->90170 90161->90147 90205 44ade5 CloseHandle ctype 90161->90205 90162 46d1ce 90217 4444c2 SetFilePointerEx SetFilePointerEx WriteFile 90162->90217 90163 46d18d 90211 467fce 82 API calls 90163->90211 90167 46d196 90212 4013a0 75 API calls 90167->90212 90168 46d1e7 90172 4092c0 VariantClear 90168->90172 90181 46d194 90168->90181 90170->90163 90170->90167 90171 46d1a2 90213 40df50 75 API calls 90171->90213 90172->90181 90174 46d1ac 90214 40d3b0 75 API calls 2 library calls 90174->90214 90176 46d224 90176->90138 90177 46d1b8 90215 467fce 82 API calls 90177->90215 90180 46d216 90218 44ade5 CloseHandle ctype 90180->90218 90181->90176 90183 40d900 90181->90183 90184 40d917 90183->90184 90185 40d909 90183->90185 90184->90185 90186 40d91c CloseHandle 90184->90186 90185->90180 90186->90180 90189 411724 90187->90189 90190 41173e 90189->90190 90192 411740 std::bad_alloc::bad_alloc 90189->90192 90219 4138ba 90189->90219 90237 411afc 6 API calls __decode_pointer 90189->90237 90190->90148 90199 40d940 76 API calls 90190->90199 90197 411766 90192->90197 90238 411421 90192->90238 90194 411770 90242 41805b RaiseException 90194->90242 90241 4116fd 67 API calls std::exception::exception 90197->90241 90198 41177e 90199->90148 90201 45306e 90200->90201 90202 45307a 90200->90202 90201->90202 90380 452e2a 111 API calls 5 library calls 90201->90380 90204 40dfa0 83 API calls 90202->90204 90204->90158 90205->90147 90207 4092c8 ctype 90206->90207 90208 429db0 VariantClear 90207->90208 90209 4092d5 ctype 90207->90209 90208->90209 90209->90152 90210->90146 90211->90181 90212->90171 90213->90174 90214->90177 90215->90181 90216->90162 90217->90168 90218->90176 90220 41396d 90219->90220 90226 4138cc 90219->90226 90250 411afc 6 API calls __decode_pointer 90220->90250 90222 4138dd 90222->90226 90243 418252 67 API calls 2 library calls 90222->90243 90244 4180a7 67 API calls 7 library calls 90222->90244 90245 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 90222->90245 90223 413973 90251 417f23 67 API calls __getptd_noexit 90223->90251 90226->90222 90229 413965 90226->90229 90230 413929 RtlAllocateHeap 90226->90230 90232 413959 90226->90232 90235 41395e 90226->90235 90246 41386b 67 API calls 4 library calls 90226->90246 90247 411afc 6 API calls __decode_pointer 90226->90247 90229->90189 90230->90226 90248 417f23 67 API calls __getptd_noexit 90232->90248 90249 417f23 67 API calls __getptd_noexit 90235->90249 90237->90189 90252 4113e5 90238->90252 90240 41142e 90240->90197 90241->90194 90242->90198 90243->90222 90244->90222 90246->90226 90247->90226 90248->90235 90249->90229 90250->90223 90251->90229 90253 4113f1 __fcloseall 90252->90253 90260 41181b 90253->90260 90259 411412 __fcloseall 90259->90240 90286 418407 90260->90286 90262 4113f6 90263 4112fa 90262->90263 90351 4169e9 TlsGetValue 90263->90351 90266 4169e9 __decode_pointer 6 API calls 90267 41131e 90266->90267 90278 4113a1 90267->90278 90361 4170e7 68 API calls 5 library calls 90267->90361 90269 41133c 90270 411388 90269->90270 90273 411357 90269->90273 90274 411366 90269->90274 90271 41696e __encode_pointer 6 API calls 90270->90271 90272 411396 90271->90272 90275 41696e __encode_pointer 6 API calls 90272->90275 90362 417047 73 API calls _realloc 90273->90362 90277 411360 90274->90277 90274->90278 90275->90278 90277->90274 90281 41137c 90277->90281 90363 417047 73 API calls _realloc 90277->90363 90283 41141b 90278->90283 90280 411376 90280->90278 90280->90281 90364 41696e TlsGetValue 90281->90364 90376 411824 90283->90376 90287 41841c 90286->90287 90288 41842f EnterCriticalSection 90286->90288 90293 418344 90287->90293 90288->90262 90290 418422 90290->90288 90321 4117af 67 API calls 3 library calls 90290->90321 90292 41842e 90292->90288 90294 418350 __fcloseall 90293->90294 90295 418360 90294->90295 90296 418378 90294->90296 90322 418252 67 API calls 2 library calls 90295->90322 90302 418386 __fcloseall 90296->90302 90325 416fb6 90296->90325 90298 418365 90323 4180a7 67 API calls 7 library calls 90298->90323 90302->90290 90303 41836c 90324 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 90303->90324 90304 4183a7 90306 418407 __lock 67 API calls 90304->90306 90305 418398 90331 417f23 67 API calls __getptd_noexit 90305->90331 90309 4183ae 90306->90309 90311 4183e2 90309->90311 90312 4183b6 90309->90312 90314 413a88 __getptd_noexit 67 API calls 90311->90314 90332 4189e6 InitializeCriticalSectionAndSpinCount __fcloseall 90312->90332 90320 4183d3 90314->90320 90315 4183c1 90315->90320 90333 413a88 90315->90333 90318 4183cd 90346 417f23 67 API calls __getptd_noexit 90318->90346 90347 4183fe LeaveCriticalSection _doexit 90320->90347 90321->90292 90322->90298 90323->90303 90328 416fbf 90325->90328 90326 4138ba _malloc 66 API calls 90326->90328 90327 416ff5 90327->90304 90327->90305 90328->90326 90328->90327 90329 416fd6 Sleep 90328->90329 90330 416feb 90329->90330 90330->90327 90330->90328 90331->90302 90332->90315 90334 413a94 __fcloseall 90333->90334 90335 413b0d __fcloseall _realloc 90334->90335 90336 418407 __lock 65 API calls 90334->90336 90345 413ad3 90334->90345 90335->90318 90342 413aab ___sbh_find_block 90336->90342 90337 413ae8 RtlFreeHeap 90337->90335 90338 413afa 90337->90338 90350 417f23 67 API calls __getptd_noexit 90338->90350 90340 413aff GetLastError 90340->90335 90341 413ac5 90349 413ade LeaveCriticalSection _doexit 90341->90349 90342->90341 90348 419f9d __VEC_memcpy VirtualFree VirtualFree HeapFree __cftoe2_l 90342->90348 90345->90335 90345->90337 90346->90320 90347->90302 90348->90341 90349->90345 90350->90340 90352 416a01 90351->90352 90353 416a22 GetModuleHandleW 90351->90353 90352->90353 90354 416a0b TlsGetValue 90352->90354 90355 416a32 90353->90355 90356 416a3d GetProcAddress 90353->90356 90359 416a16 90354->90359 90374 41177f Sleep GetModuleHandleW 90355->90374 90358 41130e 90356->90358 90358->90266 90359->90353 90359->90358 90360 416a38 90360->90356 90360->90358 90361->90269 90362->90277 90363->90280 90365 4169a7 GetModuleHandleW 90364->90365 90366 416986 90364->90366 90367 4169c2 GetProcAddress 90365->90367 90368 4169b7 90365->90368 90366->90365 90369 416990 TlsGetValue 90366->90369 90371 41699f 90367->90371 90375 41177f Sleep GetModuleHandleW 90368->90375 90373 41699b 90369->90373 90371->90270 90372 4169bd 90372->90367 90372->90371 90373->90365 90373->90371 90374->90360 90375->90372 90379 41832d LeaveCriticalSection 90376->90379 90378 411420 90378->90259 90379->90378 90380->90202 92078 42919b 92083 40ef10 92078->92083 92081 411421 __cinit 74 API calls 92082 4291aa 92081->92082 92084 41171a 75 API calls 92083->92084 92085 40ef17 92084->92085 92086 42ad48 92085->92086 92091 40ef40 74 API calls __cinit 92085->92091 92088 40ef2a 92092 40e470 92088->92092 92091->92088 92093 40c060 75 API calls 92092->92093 92094 40e483 GetVersionExW 92093->92094 92095 4021e0 75 API calls 92094->92095 92096 40e4bb 92095->92096 92118 40e600 92096->92118 92101 42accc 92104 42ad28 GetSystemInfo 92101->92104 92107 42ad38 GetSystemInfo 92104->92107 92105 40e557 GetCurrentProcess 92138 40ee30 LoadLibraryA GetProcAddress 92105->92138 92106 40e56c 92106->92107 92131 40eee0 92106->92131 92111 40e5c9 92135 40eea0 92111->92135 92114 40e5e0 92116 40e5f1 FreeLibrary 92114->92116 92117 40e5f4 92114->92117 92115 40e5dd FreeLibrary 92115->92114 92116->92117 92117->92081 92119 40e60b 92118->92119 92120 40c740 75 API calls 92119->92120 92121 40e4c2 92120->92121 92122 40e620 92121->92122 92123 40e62a 92122->92123 92124 42ac93 92123->92124 92125 40c740 75 API calls 92123->92125 92126 40e4ce 92125->92126 92126->92101 92127 40ee70 92126->92127 92128 40e551 92127->92128 92129 40ee76 LoadLibraryA 92127->92129 92128->92105 92128->92106 92129->92128 92130 40ee87 GetProcAddress 92129->92130 92130->92128 92132 40e5bf 92131->92132 92133 40eee6 LoadLibraryA 92131->92133 92132->92104 92132->92111 92133->92132 92134 40eef7 GetProcAddress 92133->92134 92134->92132 92139 40eec0 LoadLibraryA GetProcAddress 92135->92139 92137 40e5d3 GetNativeSystemInfo 92137->92114 92137->92115 92138->92106 92139->92137 92140 42e89e 92147 40c000 92140->92147 92142 42e8ac 92143 409a40 165 API calls 92142->92143 92144 42e8ca 92143->92144 92158 44b92e VariantClear 92144->92158 92146 42f3ae 92148 40c014 92147->92148 92149 40c007 92147->92149 92151 40c01a 92148->92151 92152 40c02c 92148->92152 92159 409210 VariantClear 92149->92159 92160 409210 VariantClear 92151->92160 92155 41171a 75 API calls 92152->92155 92153 40c00f 92153->92142 92157 40c033 92155->92157 92156 40c023 92156->92142 92157->92142 92158->92146 92159->92153 92160->92156 90381 40116e 90382 401119 DefWindowProcW 90381->90382
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00409A61
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID: 0vH$4RH
                                                        • API String ID: 1143807570-2085553193
                                                        • Opcode ID: 871ee0cf3e7049cfc52ffc1c0c6a20d390630c46fc92d40781a439c75a0ca281
                                                        • Instruction ID: 7c8f52bff4b3ea9a641e6aac08ab5e1c8beb32691f0f21fab5f23224d73a3634
                                                        • Opcode Fuzzy Hash: 871ee0cf3e7049cfc52ffc1c0c6a20d390630c46fc92d40781a439c75a0ca281
                                                        • Instruction Fuzzy Hash: 34238170A043109FD724DF25D480A6BB7E1BF89304F54896EE84A9B391D739EC46CB9B

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1204 40e470-40e500 call 40c060 GetVersionExW call 4021e0 call 40e600 call 40e620 1213 40e506-40e509 1204->1213 1214 42accc-42acd1 1204->1214 1217 40e540-40e555 call 40ee70 1213->1217 1218 40e50b-40e51c 1213->1218 1215 42acd3-42acdb 1214->1215 1216 42acdd-42ace0 1214->1216 1219 42ad12-42ad20 1215->1219 1220 42ace2-42aceb 1216->1220 1221 42aced-42acf0 1216->1221 1235 40e557-40e573 GetCurrentProcess call 40ee30 1217->1235 1236 40e579-40e5a8 1217->1236 1222 40e522-40e525 1218->1222 1223 42ac9b-42aca7 1218->1223 1234 42ad28-42ad2d GetSystemInfo 1219->1234 1220->1219 1221->1219 1227 42acf2-42ad06 1221->1227 1222->1217 1228 40e527-40e537 1222->1228 1225 42acb2-42acba 1223->1225 1226 42aca9-42acad 1223->1226 1225->1217 1226->1217 1230 42ad08-42ad0c 1227->1230 1231 42ad0e 1227->1231 1232 42acbf-42acc7 1228->1232 1233 40e53d 1228->1233 1230->1219 1231->1219 1232->1217 1233->1217 1237 42ad38-42ad3d GetSystemInfo 1234->1237 1235->1236 1245 40e575 1235->1245 1236->1237 1238 40e5ae-40e5c3 call 40eee0 1236->1238 1238->1234 1244 40e5c9-40e5db call 40eea0 GetNativeSystemInfo 1238->1244 1248 40e5e0-40e5ef 1244->1248 1249 40e5dd-40e5de FreeLibrary 1244->1249 1245->1236 1250 40e5f1-40e5f2 FreeLibrary 1248->1250 1251 40e5f4-40e5ff 1248->1251 1249->1248 1250->1251
                                                        APIs
                                                        • GetVersionExW.KERNEL32 ref: 0040E495
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • GetCurrentProcess.KERNEL32(?,?), ref: 0040E560
                                                        • GetNativeSystemInfo.KERNELBASE(?,?), ref: 0040E5D3
                                                        • FreeLibrary.KERNEL32(?), ref: 0040E5DE
                                                        • FreeLibrary.KERNEL32(?), ref: 0040E5F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_wcslen
                                                        • String ID: pMH$Wu
                                                        • API String ID: 2923339712-3104548426
                                                        • Opcode ID: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                                        • Instruction ID: 31d199e0849a18b4fe3a20375a839c17b1fda7a8e5a404adfed2e153d323e8b3
                                                        • Opcode Fuzzy Hash: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                                        • Instruction Fuzzy Hash: D4612E71508792AEC311CB69C44425ABFE07B6A308F580E6EE48483A42D379E568C7AB
                                                        APIs
                                                        • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EB55,0040D86E), ref: 0040EB7B
                                                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EB8D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: IsThemeActive$uxtheme.dll
                                                        • API String ID: 2574300362-3542929980
                                                        • Opcode ID: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                                        • Instruction ID: e8120cabfd18d8fe06d2f96d8b82b2b5a4bcadd10797c678d2963416b1e4c3b8
                                                        • Opcode Fuzzy Hash: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                                        • Instruction Fuzzy Hash: 05D0C9B49407039AD7306F72C918B0A7BE4AB50342F204C3EF996A1694DBBCD0508B28

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00410C44
                                                        • __wsplitpath.LIBCMT ref: 00410C61
                                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                        • _wcsncat.LIBCMT ref: 00410C78
                                                        • __wmakepath.LIBCMT ref: 00410C94
                                                          • Part of subcall function 00413E3C: __wmakepath_s.LIBCMT ref: 00413E52
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        • _wcscpy.LIBCMT ref: 00410CCC
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00020019,?), ref: 00410CE9
                                                        • RegQueryValueExW.ADVAPI32 ref: 00429BE4
                                                        • _wcscat.LIBCMT ref: 00429C43
                                                        • _wcslen.LIBCMT ref: 00429C55
                                                        • _wcslen.LIBCMT ref: 00429C66
                                                        • _wcscat.LIBCMT ref: 00429C80
                                                        • _wcsncpy.LIBCMT ref: 00429CC0
                                                        • RegCloseKey.ADVAPI32(?), ref: 00429CDE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcscat_wcslen$CloseException@8FileModuleNameOpenQueryThrowValue__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpystd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\
                                                        • API String ID: 1004883554-2276155026
                                                        • Opcode ID: d7f6643cad26fd3001d91627fc5ef1af4f656d40d4c5ca14c02d7ab544e78cf5
                                                        • Instruction ID: ef4714a7fd58501e566ba693257e1f196c1b97611c18bc9c35ab262cfa7686fb
                                                        • Opcode Fuzzy Hash: d7f6643cad26fd3001d91627fc5ef1af4f656d40d4c5ca14c02d7ab544e78cf5
                                                        • Instruction Fuzzy Hash: B961B3B1508340DFC300EF65EC8599BBBE8FB99704F44882EF544C3261EBB59948CB5A
                                                        APIs
                                                          • Part of subcall function 00409A40: _wcslen.LIBCMT ref: 00409A61
                                                          • Part of subcall function 00409A40: CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                        • Sleep.KERNEL32(0000000A), ref: 00409870
                                                        • timeGetTime.WINMM ref: 00409880
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: BuffCharSleepTimeUpper_wcslentime
                                                        • String ID:
                                                        • API String ID: 3219444185-0
                                                        • Opcode ID: b124ae733e2c30a8df030179fd7ebda2966fc041c6879d6beed06594e2dda547
                                                        • Instruction ID: 79dfb759edd1749a95aa3438e3198289cebfc990e9c1b7da565b255c5aac8c6d
                                                        • Opcode Fuzzy Hash: b124ae733e2c30a8df030179fd7ebda2966fc041c6879d6beed06594e2dda547
                                                        • Instruction Fuzzy Hash: D422F171608342ABC724DF64C984BABB7A0BF89304F14492FE54997392D77CEC45CB9A

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock$_fseek_wcscpy
                                                        • String ID: FILE
                                                        • API String ID: 3888824918-3121273764
                                                        • Opcode ID: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                                        • Instruction ID: c0f9aeb359a44d31a21a8716142a7f32772eb03c7b5129f1ec28ea3a2d041f76
                                                        • Opcode Fuzzy Hash: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                                        • Instruction Fuzzy Hash: D541EFB1504300BBD310EB55CC81FEB73A9AFC8718F54491EFA8457181F679E644C7AA

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32 ref: 00410326
                                                        • RegisterClassExW.USER32 ref: 00410359
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                                        • InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                                        • LoadIconW.USER32(00400000,000000A9), ref: 004103B1
                                                        • ImageList_ReplaceIcon.COMCTL32(00C17748,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                                        • Instruction ID: c8c51aded5b6d43d10953d3ded2c15c159303f3bf9a059b11759766ceadcbce4
                                                        • Opcode Fuzzy Hash: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                                        • Instruction Fuzzy Hash: 9F2129B4518301AFD340DF64D888B4EBFF4FB89704F008A2EF685962A0E7B58144CF5A

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 004101F9
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00410209
                                                        • LoadIconW.USER32(?,00000063), ref: 0041021F
                                                        • LoadIconW.USER32(?,000000A4), ref: 00410232
                                                        • LoadIconW.USER32(?,000000A2), ref: 00410245
                                                        • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
                                                        • RegisterClassExW.USER32 ref: 004102C6
                                                          • Part of subcall function 004102F0: GetSysColorBrush.USER32 ref: 00410326
                                                          • Part of subcall function 004102F0: RegisterClassExW.USER32 ref: 00410359
                                                          • Part of subcall function 004102F0: RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                                          • Part of subcall function 004102F0: InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                                          • Part of subcall function 004102F0: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                                          • Part of subcall function 004102F0: LoadIconW.USER32(00400000,000000A9), ref: 004103B1
                                                          • Part of subcall function 004102F0: ImageList_ReplaceIcon.COMCTL32(00C17748,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$PGH
                                                        • API String ID: 423443420-3673556320
                                                        • Opcode ID: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                                        • Instruction ID: 6be78a7d21e01e6533eb66d2751721d4fd39e3055bf34e10baa21603515e7cea
                                                        • Opcode Fuzzy Hash: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                                        • Instruction Fuzzy Hash: 60216DB5A18300AFD310CF59EC84A4A7FE4FB99710F00497FF648972A0D7B599408B99

                                                        Control-flow Graph

                                                        APIs
                                                        • _fseek.LIBCMT ref: 004525DA
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                                        • __fread_nolock.LIBCMT ref: 00452618
                                                        • __fread_nolock.LIBCMT ref: 00452629
                                                        • __fread_nolock.LIBCMT ref: 00452644
                                                        • __fread_nolock.LIBCMT ref: 00452661
                                                        • _fseek.LIBCMT ref: 0045267D
                                                        • _malloc.LIBCMT ref: 00452689
                                                        • _malloc.LIBCMT ref: 00452696
                                                        • __fread_nolock.LIBCMT ref: 004526A7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock$_fseek_malloc_wcscpy
                                                        • String ID:
                                                        • API String ID: 1911931848-0
                                                        • Opcode ID: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                                        • Instruction ID: daf5751c9f96f1f9c2235ce4d63c31b1673d17b5fb5ed0b9a51dc370059b243a
                                                        • Opcode Fuzzy Hash: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                                        • Instruction Fuzzy Hash: 47514CB1A08340AFD310DF5AD881A9BF7E9FFC8704F40492EF68887241D77AE5448B5A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1294 40f450-40f45c call 425210 1297 40f460-40f478 1294->1297 1297->1297 1298 40f47a-40f4a8 call 413990 call 410f70 1297->1298 1303 40f4b0-40f4d1 call 4151b0 1298->1303 1306 40f531 1303->1306 1307 40f4d3-40f4da 1303->1307 1310 40f536-40f540 1306->1310 1308 40f4dc-40f4de 1307->1308 1309 40f4fd-40f517 call 41557c 1307->1309 1311 40f4e0-40f4e2 1308->1311 1314 40f51c-40f51f 1309->1314 1313 40f4e6-40f4ed 1311->1313 1315 40f521-40f52c 1313->1315 1316 40f4ef-40f4f2 1313->1316 1314->1303 1319 40f543-40f54e 1315->1319 1320 40f52e-40f52f 1315->1320 1317 42937a-4293a0 call 41557c call 4151b0 1316->1317 1318 40f4f8-40f4fb 1316->1318 1331 4293a5-4293c3 call 4151d0 1317->1331 1318->1309 1318->1311 1321 40f550-40f553 1319->1321 1322 40f555-40f560 1319->1322 1320->1316 1321->1316 1324 429372 1322->1324 1325 40f566-40f571 1322->1325 1324->1317 1327 429361-429367 1325->1327 1328 40f577-40f57a 1325->1328 1327->1313 1330 42936d 1327->1330 1328->1316 1330->1324 1331->1310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock_fseek_strcat
                                                        • String ID: AU3!$EA06
                                                        • API String ID: 3818483258-2658333250
                                                        • Opcode ID: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                                        • Instruction ID: a326fe91d6bb541f17a8cee8b09d92be642ba4032c5aa5fe266a96c6f27d1a6c
                                                        • Opcode Fuzzy Hash: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                                        • Instruction Fuzzy Hash: 2B416C7160C340ABC331DA24C841AEB77A59B95308F68087EF5C597683E578E44A876B

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1334 410130-410142 SHGetMalloc 1335 410148-410158 SHGetDesktopFolder 1334->1335 1336 42944f-429459 call 411691 1334->1336 1337 4101d1-4101e0 1335->1337 1338 41015a-410188 call 411691 1335->1338 1337->1336 1344 4101e6-4101ee 1337->1344 1346 4101c5-4101ce 1338->1346 1347 41018a-4101a1 SHGetPathFromIDListW 1338->1347 1346->1337 1348 4101a3-4101b1 call 411691 1347->1348 1349 4101b4-4101c0 1347->1349 1348->1349 1349->1346
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$DesktopFolderFromListMallocPath
                                                        • String ID: C:\Users\user\Desktop\0wxckB4Iba.exe
                                                        • API String ID: 192938534-1133341390
                                                        • Opcode ID: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                                        • Instruction ID: 2fe23ff91bf644c1e681f842d3c1e96d6f0f177144f23c1ad52f1bdc7517ad48
                                                        • Opcode Fuzzy Hash: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                                        • Instruction Fuzzy Hash: 822179B5604211AFC210EB64DC84DABB3ECEFC8704F14891DF94987210E739ED46CBA6

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1352 401230-40123b 1353 401241-401272 call 4131f0 call 401be0 1352->1353 1354 4012c5-4012cd 1352->1354 1359 401274-401292 1353->1359 1360 4012ae-4012bf KillTimer SetTimer 1353->1360 1361 42aa61-42aa67 1359->1361 1362 401298-40129c 1359->1362 1360->1354 1365 42aa8b-42aaa7 Shell_NotifyIconW 1361->1365 1366 42aa69-42aa86 Shell_NotifyIconW 1361->1366 1363 4012a2-4012a8 1362->1363 1364 42aaac-42aab3 1362->1364 1363->1360 1367 42aaf8-42ab15 Shell_NotifyIconW 1363->1367 1368 42aad7-42aaf3 Shell_NotifyIconW 1364->1368 1369 42aab5-42aad2 Shell_NotifyIconW 1364->1369 1365->1360 1366->1360 1367->1360 1368->1360 1369->1360
                                                        APIs
                                                        • _memset.LIBCMT ref: 00401257
                                                          • Part of subcall function 00401BE0: _memset.LIBCMT ref: 00401C62
                                                          • Part of subcall function 00401BE0: _wcsncpy.LIBCMT ref: 00401CA1
                                                          • Part of subcall function 00401BE0: _wcscpy.LIBCMT ref: 00401CBD
                                                          • Part of subcall function 00401BE0: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                                        • KillTimer.USER32(?,?), ref: 004012B0
                                                        • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012BF
                                                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AA80
                                                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AACC
                                                        • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AB0F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_$Timer_memset$Kill_wcscpy_wcsncpy
                                                        • String ID:
                                                        • API String ID: 1792922140-0
                                                        • Opcode ID: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                                                        • Instruction ID: 78dbdb20408675f5dda5a176dd8a03fc230073daf987e80dd157250a536ae6f7
                                                        • Opcode Fuzzy Hash: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                                                        • Instruction Fuzzy Hash: 56319670609642BFD319CB24D544B9BFBE8BF85304F04856EF488A3251C7789A19D7AB

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1370 3fbe778-3fbe826 call 3fbc148 1373 3fbe82d-3fbe853 call 3fbf688 CreateFileW 1370->1373 1376 3fbe85a-3fbe86a 1373->1376 1377 3fbe855 1373->1377 1382 3fbe86c 1376->1382 1383 3fbe871-3fbe88b VirtualAlloc 1376->1383 1378 3fbe9a5-3fbe9a9 1377->1378 1380 3fbe9eb-3fbe9ee 1378->1380 1381 3fbe9ab-3fbe9af 1378->1381 1384 3fbe9f1-3fbe9f8 1380->1384 1385 3fbe9bb-3fbe9bf 1381->1385 1386 3fbe9b1-3fbe9b4 1381->1386 1382->1378 1387 3fbe88d 1383->1387 1388 3fbe892-3fbe8a9 ReadFile 1383->1388 1389 3fbe9fa-3fbea05 1384->1389 1390 3fbea4d-3fbea62 1384->1390 1391 3fbe9cf-3fbe9d3 1385->1391 1392 3fbe9c1-3fbe9cb 1385->1392 1386->1385 1387->1378 1397 3fbe8ab 1388->1397 1398 3fbe8b0-3fbe8f0 VirtualAlloc 1388->1398 1399 3fbea09-3fbea15 1389->1399 1400 3fbea07 1389->1400 1393 3fbea72-3fbea7a 1390->1393 1394 3fbea64-3fbea6f VirtualFree 1390->1394 1395 3fbe9e3 1391->1395 1396 3fbe9d5-3fbe9df 1391->1396 1392->1391 1394->1393 1395->1380 1396->1395 1397->1378 1401 3fbe8f2 1398->1401 1402 3fbe8f7-3fbe912 call 3fbf8d8 1398->1402 1403 3fbea29-3fbea35 1399->1403 1404 3fbea17-3fbea27 1399->1404 1400->1390 1401->1378 1410 3fbe91d-3fbe927 1402->1410 1407 3fbea42-3fbea48 1403->1407 1408 3fbea37-3fbea40 1403->1408 1406 3fbea4b 1404->1406 1406->1384 1407->1406 1408->1406 1411 3fbe95a-3fbe96e call 3fbf6e8 1410->1411 1412 3fbe929-3fbe958 call 3fbf8d8 1410->1412 1418 3fbe972-3fbe976 1411->1418 1419 3fbe970 1411->1419 1412->1410 1420 3fbe978-3fbe97c CloseHandle 1418->1420 1421 3fbe982-3fbe986 1418->1421 1419->1378 1420->1421 1422 3fbe988-3fbe993 VirtualFree 1421->1422 1423 3fbe996-3fbe99f 1421->1423 1422->1423 1423->1373 1423->1378
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03FBE849
                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03FBEA6F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1424518229.0000000003FBC000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FBC000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3fbc000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CreateFileFreeVirtual
                                                        • String ID:
                                                        • API String ID: 204039940-0
                                                        • Opcode ID: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
                                                        • Instruction ID: f9f5178a2d1638e49c3f99677a0f002882a6b63e530e7c1abd74f79dff19d012
                                                        • Opcode Fuzzy Hash: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
                                                        • Instruction Fuzzy Hash: 28A149B4E00209EBDB14CFA5D994BEEBBB9FF58304F248199E141BB280D7759A44CF94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1424 414f10-414f2c 1425 414f4f 1424->1425 1426 414f2e-414f31 1424->1426 1428 414f51-414f55 1425->1428 1426->1425 1427 414f33-414f35 1426->1427 1429 414f37-414f46 call 417f23 1427->1429 1430 414f56-414f5b 1427->1430 1442 414f47-414f4c call 417ebb 1429->1442 1432 414f6a-414f6d 1430->1432 1433 414f5d-414f68 1430->1433 1436 414f7a-414f7c 1432->1436 1437 414f6f-414f77 call 4131f0 1432->1437 1433->1432 1435 414f8b-414f9e 1433->1435 1440 414fa0-414fa6 1435->1440 1441 414fa8 1435->1441 1436->1429 1439 414f7e-414f89 1436->1439 1437->1436 1439->1429 1439->1435 1444 414faf-414fb1 1440->1444 1441->1444 1442->1425 1446 4150a1-4150a4 1444->1446 1447 414fb7-414fbe 1444->1447 1446->1428 1449 414fc0-414fc5 1447->1449 1450 415004-415007 1447->1450 1449->1450 1453 414fc7 1449->1453 1451 415071-415072 call 41e6b1 1450->1451 1452 415009-41500d 1450->1452 1459 415077-41507b 1451->1459 1455 41500f-415018 1452->1455 1456 41502e-415035 1452->1456 1457 415102 1453->1457 1458 414fcd-414fd1 1453->1458 1460 415023-415028 1455->1460 1461 41501a-415021 1455->1461 1463 415037 1456->1463 1464 415039-41503c 1456->1464 1462 415106-41510f 1457->1462 1465 414fd3 1458->1465 1466 414fd5-414fd8 1458->1466 1459->1462 1467 415081-415085 1459->1467 1468 41502a-41502c 1460->1468 1461->1468 1462->1428 1463->1464 1469 415042-41504e call 41453a call 41ed9e 1464->1469 1470 4150d5-4150d9 1464->1470 1465->1466 1471 4150a9-4150af 1466->1471 1472 414fde-414fff call 41ee9b 1466->1472 1467->1470 1475 415087-415096 1467->1475 1468->1464 1492 415053-415058 1469->1492 1473 4150eb-4150fd call 417f23 1470->1473 1474 4150db-4150e8 call 4131f0 1470->1474 1476 4150b1-4150bd call 4131f0 1471->1476 1477 4150c0-4150d0 call 417f23 1471->1477 1483 415099-41509b 1472->1483 1473->1442 1474->1473 1475->1483 1476->1477 1477->1442 1483->1446 1483->1447 1493 415114-415118 1492->1493 1494 41505e-415061 1492->1494 1493->1462 1494->1457 1495 415067-41506f 1494->1495 1495->1483
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                        • String ID:
                                                        • API String ID: 3886058894-0
                                                        • Opcode ID: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                                        • Instruction ID: 085ef53bf2cba992f8731f00f2d52beda6aca72a1b803249d76dffc069a60243
                                                        • Opcode Fuzzy Hash: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                                        • Instruction Fuzzy Hash: CA510830900604EFCB208FA9C8445DFBBB5EFC5324F24825BF82596290D7799ED2CB99

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1496 4103e0-410461 CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
                                                        • ShowWindow.USER32(?,00000000), ref: 00410454
                                                        • ShowWindow.USER32(?,00000000), ref: 0041045E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                                        • Instruction ID: daa3d4afae2654ee996124117597f48fa5c574a0ac4b96d00400a8ba476d7f73
                                                        • Opcode Fuzzy Hash: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                                        • Instruction Fuzzy Hash: F3F0A975BE4310BAF6609754AC43F592B59A765F00F3445ABB700BF1D0D6E478408B9C

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1497 3fbe4f8-3fbe66d call 3fbc148 call 3fbe3e8 CreateFileW 1504 3fbe66f 1497->1504 1505 3fbe674-3fbe684 1497->1505 1506 3fbe724-3fbe729 1504->1506 1508 3fbe68b-3fbe6a5 VirtualAlloc 1505->1508 1509 3fbe686 1505->1509 1510 3fbe6a9-3fbe6c0 ReadFile 1508->1510 1511 3fbe6a7 1508->1511 1509->1506 1512 3fbe6c2 1510->1512 1513 3fbe6c4-3fbe6fe call 3fbe428 call 3fbd3e8 1510->1513 1511->1506 1512->1506 1518 3fbe71a-3fbe722 ExitProcess 1513->1518 1519 3fbe700-3fbe715 call 3fbe478 1513->1519 1518->1506 1519->1518
                                                        APIs
                                                          • Part of subcall function 03FBE3E8: Sleep.KERNELBASE(000001F4), ref: 03FBE3F9
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03FBE660
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1424518229.0000000003FBC000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FBC000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3fbc000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CreateFileSleep
                                                        • String ID: JC7KS6UEOVCBPZBZVF
                                                        • API String ID: 2694422964-1630166903
                                                        • Opcode ID: 6caf923d28f9cea732392c3a61e5a5b5d5b5dc069db3946f1826c32e2080fe5f
                                                        • Instruction ID: c1b741e9cf501c3fb91647c40458a7a31165986f9190064aba68142c99553fd7
                                                        • Opcode Fuzzy Hash: 6caf923d28f9cea732392c3a61e5a5b5d5b5dc069db3946f1826c32e2080fe5f
                                                        • Instruction Fuzzy Hash: 1D61B270E14248DBEF11DBA4D854BEEBB75EF29300F104199E208BB2C0D7BA5B45CB66

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1521 413a88-413a99 call 41718c 1524 413b10-413b15 call 4171d1 1521->1524 1525 413a9b-413aa2 1521->1525 1526 413aa4-413abc call 418407 call 419f6d 1525->1526 1527 413ae7 1525->1527 1539 413ac7-413ad7 call 413ade 1526->1539 1540 413abe-413ac6 call 419f9d 1526->1540 1531 413ae8-413af8 RtlFreeHeap 1527->1531 1531->1524 1533 413afa-413b0f call 417f23 GetLastError call 417ee1 1531->1533 1533->1524 1539->1524 1546 413ad9-413adc 1539->1546 1540->1539 1546->1531
                                                        APIs
                                                        • __lock.LIBCMT ref: 00413AA6
                                                          • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
                                                          • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
                                                          • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
                                                        • ___sbh_find_block.LIBCMT ref: 00413AB1
                                                        • ___sbh_free_block.LIBCMT ref: 00413AC0
                                                        • RtlFreeHeap.NTDLL(00000000,00411739,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
                                                        • GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 2714421763-0
                                                        • Opcode ID: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                                        • Instruction ID: 54fb22c17cbd059cfb8714ef359fce415cc636064f476ff80f42ef981757bf49
                                                        • Opcode Fuzzy Hash: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                                        • Instruction Fuzzy Hash: 7401A731A08301BADF206F71AC09BDF3B64AF00759F10052FF544A6182DB7D9AC19B9C

                                                        Control-flow Graph

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Wu
                                                        • API String ID: 0-4083010176
                                                        • Opcode ID: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                                        • Instruction ID: a1f682be926937ece900e9fcc50ccc13891f43ead78ba7c6857800eee9f0599c
                                                        • Opcode Fuzzy Hash: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                                        • Instruction Fuzzy Hash: EC81D2756043009FC310EF65C985B6AB7E4EF84315F008D2EF988AB392D779E909CB96
                                                        APIs
                                                          • Part of subcall function 0040F580: _wcslen.LIBCMT ref: 0040F58A
                                                          • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 0040F5A3
                                                          • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,-00000010,00000001,?,?,?,?), ref: 0040F5CC
                                                        • _strcat.LIBCMT ref: 0040F603
                                                          • Part of subcall function 0040F6A0: _memset.LIBCMT ref: 0040F6A8
                                                          • Part of subcall function 0040F6D0: _strlen.LIBCMT ref: 0040F6D8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$_memset_strcat_strlen_wcslen
                                                        • String ID: HH
                                                        • API String ID: 1194219731-2761332787
                                                        • Opcode ID: 6830d432ce0edc537904fcc81a92ccb4243d6e1eaca554fb6fd30da9042373f9
                                                        • Instruction ID: 1fd31f67f6889806bd2ce24d6488871f5ee50ddf162d20410a363c4a19aba518
                                                        • Opcode Fuzzy Hash: 6830d432ce0edc537904fcc81a92ccb4243d6e1eaca554fb6fd30da9042373f9
                                                        • Instruction Fuzzy Hash: 022158B260825067C724EF7A9C8266EF7D8AF85308F148C3FF554D2282F638D555879A
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03FBDC15
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03FBDC39
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03FBDC5B
                                                        • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 03FBDF64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1424518229.0000000003FBC000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FBC000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3fbc000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                                        • String ID:
                                                        • API String ID: 572931308-0
                                                        • Opcode ID: 278d2c19580acd0a32290de50df0706ed78756ca3fb4c03b9795f1de340d2013
                                                        • Instruction ID: 2ae6354d24ac6595ddfcefa7d8f6802af9619565e6a3c2f6d1fdb9aee213f531
                                                        • Opcode Fuzzy Hash: 278d2c19580acd0a32290de50df0706ed78756ca3fb4c03b9795f1de340d2013
                                                        • Instruction Fuzzy Hash: 1D621D74A14218DBEB24DFA5C850BDEB375EF58300F1091A9E10DEB390E7799E81CB5A
                                                        APIs
                                                        • _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                                          • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                                          • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                                        • std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 004116B0: std::exception::exception.LIBCMT ref: 004116BC
                                                        • std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                        • __CxxThrowException@8.LIBCMT ref: 00411779
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 1411284514-0
                                                        • Opcode ID: ca7221cdd9cc9326792a0c346bb7c35cd30f9974032eaa45b6addcc39664c516
                                                        • Instruction ID: c554e94cc15d94fff19a40754e7570613bf3612ee9c26c673f8185df9075a277
                                                        • Opcode Fuzzy Hash: ca7221cdd9cc9326792a0c346bb7c35cd30f9974032eaa45b6addcc39664c516
                                                        • Instruction Fuzzy Hash: 6FF0E23550060A66CF08B723EC06ADE3B649F11798B10403BFA20552F2DF6DADC9865C
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,0040F0EE,00000000,00000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F132
                                                        • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F14F
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F159
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID:
                                                        • API String ID: 3677997916-0
                                                        • Opcode ID: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                                        • Instruction ID: 6acd5c45b0bc896a902747136fbadff1bb775023c46fd22fba7b324c5144c726
                                                        • Opcode Fuzzy Hash: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                                        • Instruction Fuzzy Hash: 60F0BDB0204202ABD614DF54DD88E6BB7F9EF88704F10492DB585D7250D7B4A804CB26
                                                        APIs
                                                        • _malloc.LIBCMT ref: 00435278
                                                          • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                                          • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                                          • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                                        • _malloc.LIBCMT ref: 00435288
                                                        • _malloc.LIBCMT ref: 00435298
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _malloc$AllocateHeap
                                                        • String ID:
                                                        • API String ID: 680241177-0
                                                        • Opcode ID: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                                        • Instruction ID: 30b75876ff52ae1c35022de4a6700901ba1db26c97f4d16f7fcf584af9a5a73f
                                                        • Opcode Fuzzy Hash: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                                        • Instruction Fuzzy Hash: E5F0A0B1500F0046E660AB3198457C7A2E09B14307F00186FB6855618ADA7C69C4CEAC
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 03FBE4D2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1424518229.0000000003FBC000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FBC000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3fbc000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID: D
                                                        • API String ID: 963392458-2746444292
                                                        • Opcode ID: e46bc5b6f0112d159e7feef24d1a01d5135e122a122474bb2cfe05eb95378e7b
                                                        • Instruction ID: da669834932cc0786fea6d263c67e72598798d6880b8919196de87ffabceab2c
                                                        • Opcode Fuzzy Hash: e46bc5b6f0112d159e7feef24d1a01d5135e122a122474bb2cfe05eb95378e7b
                                                        • Instruction Fuzzy Hash: 07016DB5900308ABEB20DFE1DC49FFE737CAF54701F508548BB159A080EA789608CB51
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00401B71
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID: @EXITCODE
                                                        • API String ID: 580348202-3436989551
                                                        • Opcode ID: 48d001a4b96ee351bc7679959485890c1c6d832d60c6cde5ea273d4c8ab31dfe
                                                        • Instruction ID: 288ad252d7dad0c090ff8240dee62855692e698d70424b42c0a66861a7771545
                                                        • Opcode Fuzzy Hash: 48d001a4b96ee351bc7679959485890c1c6d832d60c6cde5ea273d4c8ab31dfe
                                                        • Instruction Fuzzy Hash: 73F06DF2A002025BD7649B35DC0276776E4AB44704F18C83EE14AC7791F6BDE8829B15
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03FBDC15
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03FBDC39
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03FBDC5B
                                                        • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 03FBDF64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1424518229.0000000003FBC000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FBC000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3fbc000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                                        • String ID:
                                                        • API String ID: 572931308-0
                                                        • Opcode ID: 130bf73a61b2d5095b231ce8a30f1fd98ce1e60d36488c03d4234413586ce36e
                                                        • Instruction ID: 6b2f7259220fa44eff1900eec71509848d2051780ab96b00e310ffac86002720
                                                        • Opcode Fuzzy Hash: 130bf73a61b2d5095b231ce8a30f1fd98ce1e60d36488c03d4234413586ce36e
                                                        • Instruction Fuzzy Hash: F812C124E24658C6EB24DF64D8507DEB232EF68300F1054E9910DEB7A5E77A4F81CF5A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: e8abe42c1057cb3860218bb04af0a307767d699fcca626a70098e271a71bf477
                                                        • Instruction ID: 1f11e118333250ff1b1cce483c812f274274124743f71e781b8a547d9d3e43da
                                                        • Opcode Fuzzy Hash: e8abe42c1057cb3860218bb04af0a307767d699fcca626a70098e271a71bf477
                                                        • Instruction Fuzzy Hash: 35917E706042009FC714DF55D890A6AB7E5EF89318F14896FF849AB392D738EE41CB9E
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0040DFD2,?,00000001,00403843,?), ref: 0040F00A
                                                        • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000004,00000080,00000000,?,0040DFD2,?,00000001,00403843,?), ref: 004299D9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                                                        • Instruction ID: 855a981e3d87b0586b227f36a287a9e63fe5cd358b5bfab8de368ff291d46a89
                                                        • Opcode Fuzzy Hash: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                                                        • Instruction Fuzzy Hash: 67011D703803107AF2311F28AD5BF5632546B44B24F244B39FBD5BE2E2D2F86885970C
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __lock_file_memset
                                                        • String ID:
                                                        • API String ID: 26237723-0
                                                        • Opcode ID: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                                        • Instruction ID: c8a12bf2a45d0ac11074f8cac28b928f9e20b60047ac9024d749846706a082ab
                                                        • Opcode Fuzzy Hash: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                                        • Instruction Fuzzy Hash: 32012971C00609FBCF22AF65DC029DF3B31AF44714F04815BF82416261D7798AA2DF99
                                                        APIs
                                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                        • __lock_file.LIBCMT ref: 00414EE4
                                                          • Part of subcall function 00415965: __lock.LIBCMT ref: 0041598A
                                                        • __fclose_nolock.LIBCMT ref: 00414EEE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __decode_pointer__fclose_nolock__getptd_noexit__lock__lock_file
                                                        • String ID:
                                                        • API String ID: 717694121-0
                                                        • Opcode ID: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                                        • Instruction ID: 225a509e04b880138f2478077c57af59103cae2c072c29012e7845c0956b1514
                                                        • Opcode Fuzzy Hash: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                                        • Instruction Fuzzy Hash: DEF06270D0470499C721BB6A9802ADE7AB0AFC1338F21864FE479A72D1C77C46C29F5D
                                                        APIs
                                                        • TranslateMessage.USER32(?), ref: 004098F6
                                                        • DispatchMessageW.USER32(?), ref: 00409901
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Message$DispatchTranslate
                                                        • String ID:
                                                        • API String ID: 1706434739-0
                                                        • Opcode ID: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                                                        • Instruction ID: 6b3a2aeb923af73eb4cdb1bab797699f2cf27729a5018e8568c19fb4e3feaf67
                                                        • Opcode Fuzzy Hash: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                                                        • Instruction Fuzzy Hash: D4F05471114301AEDA24DBE58D41B5BB3A8AFD8700F408C2EBA51E61C1FBF8E404C76A
                                                        APIs
                                                        • TranslateMessage.USER32(?), ref: 004098F6
                                                        • DispatchMessageW.USER32(?), ref: 00409901
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Message$DispatchTranslate
                                                        • String ID:
                                                        • API String ID: 1706434739-0
                                                        • Opcode ID: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                                                        • Instruction ID: cc4909b6a78c34842ee59a7900970f574117f06624f4f9c7373c79b1fb9dfc76
                                                        • Opcode Fuzzy Hash: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                                                        • Instruction Fuzzy Hash: DDF054B1114301AADA14DBE58D41B5BB3A4AF94740F408C2EBA11E52C1EBFCD504C71A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: fb1d736feddc8336b94c661b4f3a99b04f66f7614ca83ae43ac4a02a862e88ab
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: 1331D574A00105DFC718DF99E490AAAFBA6FB49304B2486A6E409CB751D774EDC1CBC5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a12857963b59ba27d86be744ec8e6ce9272b51880a9e98fb69d1fc4369ccfb77
                                                        • Instruction ID: 573dba848690e0cdfd4c9be45b5663ff9194aa529e9341154cf92adfcd841cf8
                                                        • Opcode Fuzzy Hash: a12857963b59ba27d86be744ec8e6ce9272b51880a9e98fb69d1fc4369ccfb77
                                                        • Instruction Fuzzy Hash: 5E11C374200200ABC7249FAAD8D5F2A73A5AF45304B244C6FE845E7392D73CEC81EB5E
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ProcWindow
                                                        • String ID:
                                                        • API String ID: 181713994-0
                                                        • Opcode ID: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                                        • Instruction ID: 72bdf1ad184d721e15e17473fba0dc1faec6c1a9a9d1f3fcb71c15abd8c9f185
                                                        • Opcode Fuzzy Hash: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                                        • Instruction Fuzzy Hash: FDF05436700118A7DF38995CE89ACFF632AD7ED350F418227FD152B3A6813C5C41966E
                                                        APIs
                                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0041AA46
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CreateHeap
                                                        • String ID:
                                                        • API String ID: 10892065-0
                                                        • Opcode ID: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                                        • Instruction ID: 99ddfbee892492b32903703907324a593b21f4d4a70cf9c354be63060b8faba1
                                                        • Opcode Fuzzy Hash: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                                        • Instruction Fuzzy Hash: 56D05E325543449EDF009F71AC087663FDCE788395F008836BC1CC6150E778C950CA08
                                                        APIs
                                                          • Part of subcall function 00444326: SetFilePointerEx.KERNEL32(00000000,00000001,00000000,00000000,00000001,?,?,0044434E,?,?,00429A83,?,00487174,00000003,0040DFEE,?), ref: 004442F3
                                                        • WriteFile.KERNELBASE(?,?,00000001,?,00000000,?,?,00429A83,?,00487174,00000003,0040DFEE,?,?,00000001,00403843), ref: 00444362
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: File$PointerWrite
                                                        • String ID:
                                                        • API String ID: 539440098-0
                                                        • Opcode ID: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                                                        • Instruction ID: 4a339a6eb5dfef6003722c1615037f540bc53d76d7f4c43935d02bdd90bbdfc9
                                                        • Opcode Fuzzy Hash: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                                                        • Instruction Fuzzy Hash: 7CE09275104311AFD250DF54D944F9BB3F8AF88714F108D0EF59587241D7B4A9848BA6
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ProcWindow
                                                        • String ID:
                                                        • API String ID: 181713994-0
                                                        • Opcode ID: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                                        • Instruction ID: 4c36cba44089d0e03573cc5e8dee84df23505be31ebc2729507753268ee0d302
                                                        • Opcode Fuzzy Hash: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                                        • Instruction Fuzzy Hash: C3C08C72100008BB8700DE04EC44CFBB72CEBD8310700C20BBC0586201C230885097A1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __wfsopen
                                                        • String ID:
                                                        • API String ID: 197181222-0
                                                        • Opcode ID: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                                        • Instruction ID: 6225ca515e7db1e5d7746fb8cf1e0ad45b41b4d1817cc5a1d8a93eb941133566
                                                        • Opcode Fuzzy Hash: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                                        • Instruction Fuzzy Hash: EDC09B7644010C77CF122943FC02E453F1997C0764F044011FB1C1D561D577D5619589
                                                        APIs
                                                        • CloseHandle.KERNELBASE(00000000,?,0040DF8E), ref: 0040D91D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle
                                                        • String ID:
                                                        • API String ID: 2962429428-0
                                                        • Opcode ID: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                                                        • Instruction ID: 397672216df932ca6c22f29d52987cd2165f63c791f69eb8015935d900cfb6d9
                                                        • Opcode Fuzzy Hash: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                                                        • Instruction Fuzzy Hash: 16E0DEB5900B019EC7318F6AE544416FBF8AEE46213248E2FD4E6D2A64D3B4A5898F54
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 03FBE3F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1424518229.0000000003FBC000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FBC000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3fbc000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                        • Instruction ID: d655e2e2217a0875e6ea192d7335d301bb5dc09e2ade620b32fada448d0b9003
                                                        • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                        • Instruction Fuzzy Hash: 0EE0BF7494010DEFDB00DFA8D5496DD7BB4EF04301F1045A1FD05D7681DB309E548A62
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 03FBE3F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1424518229.0000000003FBC000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FBC000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3fbc000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction ID: ba302aaa5c9d731adae224bc6221a83ca724bf0c7ad3430db186344e58708002
                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction Fuzzy Hash: C4E0E67494010DDFDB00DFB8D5496DD7FB4EF04301F1045A1FD01D2281D6309D508A72
                                                        APIs
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C158
                                                        • DefDlgProcW.USER32(?,0000004E,?,?,004A83D8,?,004A83D8,?), ref: 0047C173
                                                        • GetKeyState.USER32(00000011), ref: 0047C1A4
                                                        • GetKeyState.USER32(00000009), ref: 0047C1AD
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C1C0
                                                        • GetKeyState.USER32(00000010), ref: 0047C1CA
                                                        • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C1DE
                                                        • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C20A
                                                        • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C22D
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047C2D6
                                                        • SendMessageW.USER32 ref: 0047C2FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$State$LongProcWindow
                                                        • String ID: @GUI_DRAGID$F
                                                        • API String ID: 1562745308-4164748364
                                                        • Opcode ID: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                                        • Instruction ID: f40edf6d5039c675f00343e7880f865f139be9e64e9b8d530a61de5f06f6045f
                                                        • Opcode Fuzzy Hash: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                                        • Instruction Fuzzy Hash: C6429F702042019FD714CF54C884FAB77A5EB89B04F548A6EFA48AB291DBB4EC45CB5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PF$'|G$*"D$*vG$+%F$0wE$2G$5CG$7eF$<HF$<G$ApG$DvE$GSG$IqE$K@G$LbF$MdF$NgF$PIF$YtG$^[F$_?G$b"D$i}G$j)F$kQG$lE$rTG$vjE$}eE$*F$3G$_G$wG
                                                        • API String ID: 0-3772701627
                                                        • Opcode ID: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                                        • Instruction ID: b1e67458769bbea4a86cd8903524db5b6e79558e2e7ab8c51025fc7bd56032a7
                                                        • Opcode Fuzzy Hash: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                                        • Instruction Fuzzy Hash: 118366F1905B409FC351DFAAF984605BAE1F3AA3157A2857FC5088B731D7B8194A8F4C
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,?,?,004448AF,?), ref: 004375B3
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004375D8
                                                        • IsIconic.USER32(?), ref: 004375E1
                                                        • ShowWindow.USER32(?,00000009,?,?,004448AF,?), ref: 004375EE
                                                        • SetForegroundWindow.USER32(?), ref: 004375FD
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00437615
                                                        • GetCurrentThreadId.KERNEL32 ref: 00437619
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00437624
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437632
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437638
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 0043763E
                                                        • SetForegroundWindow.USER32(?), ref: 00437645
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437654
                                                        • keybd_event.USER32(00000012,00000000), ref: 0043765D
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043766B
                                                        • keybd_event.USER32(00000012,00000000), ref: 00437674
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437682
                                                        • keybd_event.USER32(00000012,00000000), ref: 0043768B
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437699
                                                        • keybd_event.USER32(00000012,00000000), ref: 004376A2
                                                        • SetForegroundWindow.USER32(?), ref: 004376AD
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376CD
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D3
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 3778422247-2988720461
                                                        • Opcode ID: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                                        • Instruction ID: 6108fbe056c1a000d5481f33e03d330ccc862392245923d3170deea12ea07584
                                                        • Opcode Fuzzy Hash: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                                        • Instruction Fuzzy Hash: AC31A4712803157FE6245BA59D0EF7F3F9CEB48B51F10082EFA02EA1D1DAE458009B79
                                                        APIs
                                                        • _memset.LIBCMT ref: 0044621B
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,?,?,?,?,?,?,?), ref: 00446277
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0044628A
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004462A4
                                                        • GetProcessWindowStation.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462BD
                                                        • SetProcessWindowStation.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462C8
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004462E4
                                                        • _wcslen.LIBCMT ref: 0044639E
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • _wcsncpy.LIBCMT ref: 004463C7
                                                        • LoadUserProfileW.USERENV(?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 004463E7
                                                        • CreateEnvironmentBlock.USERENV(?,?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 00446408
                                                        • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,?,00000000,?,?,00000000,?), ref: 00446446
                                                        • UnloadUserProfile.USERENV(?,?,?,?,?,?,?), ref: 00446483
                                                        • CloseWindowStation.USER32(00000000,?,?,?,?), ref: 00446497
                                                        • CloseDesktop.USER32(00000000,?,?,?,?), ref: 0044649E
                                                        • SetProcessWindowStation.USER32(?,?,?,?,?), ref: 004464A9
                                                        • CloseHandle.KERNEL32(?,?,?,?,?), ref: 004464B4
                                                        • DestroyEnvironmentBlock.USERENV(?,?,?,?,?,?), ref: 004464C8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_memset_wcslen_wcsncpy
                                                        • String ID: $default$winsta0
                                                        • API String ID: 2173856841-1027155976
                                                        • Opcode ID: 8783c105518f9fa52f5c80a6299cf7ec7b6e28c011eada52347f54b488ad9e21
                                                        • Instruction ID: eafd5d154f9bcf2590b8f8eb1e0f3d39b01f77f2fd200ee1cb9c7344d9c52646
                                                        • Opcode Fuzzy Hash: 8783c105518f9fa52f5c80a6299cf7ec7b6e28c011eada52347f54b488ad9e21
                                                        • Instruction Fuzzy Hash: DD819170208341AFE724DF65C848B6FBBE8AF89744F04491DF69097291DBB8D805CB6B
                                                        APIs
                                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\0wxckB4Iba.exe,?,C:\Users\user\Desktop\0wxckB4Iba.exe,004A8E80,C:\Users\user\Desktop\0wxckB4Iba.exe,0040F3D2), ref: 0040FFCA
                                                          • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A45
                                                          • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A6C
                                                          • Part of subcall function 00436A1D: __wcsicoll.LIBCMT ref: 00436A93
                                                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                        • _wcscat.LIBCMT ref: 0044BD96
                                                        • _wcscat.LIBCMT ref: 0044BDBF
                                                        • __wsplitpath.LIBCMT ref: 0044BDEC
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0044BE04
                                                        • _wcscpy.LIBCMT ref: 0044BE73
                                                        • _wcscat.LIBCMT ref: 0044BE85
                                                        • _wcscat.LIBCMT ref: 0044BE97
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC3
                                                        • DeleteFileW.KERNEL32(?), ref: 0044BED5
                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BEF5
                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0C
                                                        • DeleteFileW.KERNEL32(?), ref: 0044BF17
                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2E
                                                        • FindClose.KERNEL32(00000000), ref: 0044BF35
                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BF51
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF66
                                                        • FindClose.KERNEL32(00000000), ref: 0044BF7E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 2188072990-1173974218
                                                        • Opcode ID: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                                        • Instruction ID: 14f7055b3521afb04026f42b490306401b0ba37f80ed0ea0ca267746d8cc4687
                                                        • Opcode Fuzzy Hash: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                                        • Instruction Fuzzy Hash: CA5166B2008344AAD720DBA4DC44FDF73E8AB85314F448D1EF68982141EB79D64CCBAA
                                                        APIs
                                                        • __invoke_watson.LIBCMT ref: 004203A4
                                                          • Part of subcall function 00417D93: _memset.LIBCMT ref: 00417DBB
                                                          • Part of subcall function 00417D93: IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 00417E6F
                                                          • Part of subcall function 00417D93: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000314), ref: 00417E79
                                                          • Part of subcall function 00417D93: UnhandledExceptionFilter.KERNEL32(?,?,?,00000314), ref: 00417E86
                                                          • Part of subcall function 00417D93: GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 00417EA1
                                                          • Part of subcall function 00417D93: TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 00417EA8
                                                        • __get_daylight.LIBCMT ref: 004203B0
                                                        • __invoke_watson.LIBCMT ref: 004203BF
                                                        • __get_daylight.LIBCMT ref: 004203CB
                                                        • __invoke_watson.LIBCMT ref: 004203DA
                                                        • ____lc_codepage_func.LIBCMT ref: 004203E2
                                                        • _strlen.LIBCMT ref: 00420442
                                                        • __malloc_crt.LIBCMT ref: 00420449
                                                        • _strlen.LIBCMT ref: 0042045F
                                                        • _strcpy_s.LIBCMT ref: 0042046D
                                                        • __invoke_watson.LIBCMT ref: 00420482
                                                        • GetTimeZoneInformation.KERNEL32(00496C28), ref: 004204AA
                                                        • WideCharToMultiByte.KERNEL32(?,?,00496C2C,?,?,0000003F,?,?), ref: 00420528
                                                        • WideCharToMultiByte.KERNEL32(?,?,00496C80,000000FF,?,0000003F,?,?,?,00496C2C,?,?,0000003F,?,?), ref: 0042055C
                                                          • Part of subcall function 00413A88: __lock.LIBCMT ref: 00413AA6
                                                          • Part of subcall function 00413A88: ___sbh_find_block.LIBCMT ref: 00413AB1
                                                          • Part of subcall function 00413A88: ___sbh_free_block.LIBCMT ref: 00413AC0
                                                          • Part of subcall function 00413A88: RtlFreeHeap.NTDLL(00000000,00411739,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
                                                          • Part of subcall function 00413A88: GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                                        • __invoke_watson.LIBCMT ref: 004205CC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __invoke_watson$ByteCharExceptionFilterMultiProcessUnhandledWide__get_daylight_strlen$CurrentDebuggerErrorFreeHeapInformationLastPresentTerminateTimeZone____lc_codepage_func___sbh_find_block___sbh_free_block__lock__malloc_crt_memset_strcpy_s
                                                        • String ID: S\
                                                        • API String ID: 4084823496-393906132
                                                        • Opcode ID: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                                        • Instruction ID: b357f19af7064e56bcdb8625987f67de7edc2332d57e558cb2e7b84f91b73af7
                                                        • Opcode Fuzzy Hash: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                                        • Instruction Fuzzy Hash: 6A91D371E00125AFDB20EF65EC819AE7BE9EF55300B95003BF540A7253DA3C89828F5C
                                                        APIs
                                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00434D75
                                                        • __swprintf.LIBCMT ref: 00434D91
                                                        • _wcslen.LIBCMT ref: 00434D9B
                                                        • _wcslen.LIBCMT ref: 00434DB0
                                                        • _wcslen.LIBCMT ref: 00434DC5
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00434DD7
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00434E0A
                                                        • _memset.LIBCMT ref: 00434E27
                                                        • _wcslen.LIBCMT ref: 00434E3C
                                                        • _wcsncpy.LIBCMT ref: 00434E6F
                                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00434EA9
                                                        • CloseHandle.KERNEL32(00000000), ref: 00434EB4
                                                        • RemoveDirectoryW.KERNEL32(?), ref: 00434EBB
                                                        • CloseHandle.KERNEL32(00000000), ref: 00434ECE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                        • String ID: :$\$\??\%s
                                                        • API String ID: 302090198-3457252023
                                                        • Opcode ID: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                                        • Instruction ID: 730b2dca1b6b09bd6b76555d3316dee95f4818bcffb97f26f8f03165767cfd2f
                                                        • Opcode Fuzzy Hash: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                                        • Instruction Fuzzy Hash: 30416676604340ABE330EB64DC49FEF73E8AFD8714F00891EF649921D1E7B4A645876A
                                                        APIs
                                                          • Part of subcall function 00444233: _wcslen.LIBCMT ref: 0044424E
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0046449E
                                                        • GetLastError.KERNEL32 ref: 004644B4
                                                        • GetCurrentThread.KERNEL32 ref: 004644C8
                                                        • OpenThreadToken.ADVAPI32(00000000), ref: 004644CF
                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004644E0
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004644E7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 1312810259-2896544425
                                                        • Opcode ID: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                                        • Instruction ID: c3f5e6af55eb0da9fa74db60d4f5a84adac3a89a74612fbe59a223ef38337450
                                                        • Opcode Fuzzy Hash: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                                        • Instruction Fuzzy Hash: 0E51A171200201AFD710DF65DD85F5BB7A8AB84704F10892EFB44DB2C1D7B8E844CBAA
                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,00000001,?,00000000), ref: 0040D6E5
                                                          • Part of subcall function 00401F80: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\0wxckB4Iba.exe,00000104,?,?,?,?,00000000), ref: 00401FAD
                                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 00402078
                                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 0040208E
                                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020A4
                                                          • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020BA
                                                          • Part of subcall function 00401F80: _wcscpy.LIBCMT ref: 004020EF
                                                        • IsDebuggerPresent.KERNEL32(?), ref: 0040D6F1
                                                        • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\0wxckB4Iba.exe,00000104,?,004A7CF8,004A7CFC), ref: 0040D763
                                                          • Part of subcall function 00401440: GetFullPathNameW.KERNEL32(?,00000104,?,00000000), ref: 00401483
                                                        • SetCurrentDirectoryW.KERNEL32(?,00000001,C:\Users\user\Desktop\0wxckB4Iba.exe,00000004), ref: 0040D7D6
                                                        • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,004846D6,00000010), ref: 00431AAB
                                                        • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\Desktop\0wxckB4Iba.exe,00000004), ref: 00431B0E
                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,C:\Users\user\Desktop\0wxckB4Iba.exe,00000004), ref: 00431B3F
                                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 00431B8B
                                                        • ShellExecuteW.SHELL32(00000000), ref: 00431B92
                                                          • Part of subcall function 004101F0: GetSysColorBrush.USER32(0000000F), ref: 004101F9
                                                          • Part of subcall function 004101F0: LoadCursorW.USER32(00000000,00007F00), ref: 00410209
                                                          • Part of subcall function 004101F0: LoadIconW.USER32(?,00000063), ref: 0041021F
                                                          • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A4), ref: 00410232
                                                          • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A2), ref: 00410245
                                                          • Part of subcall function 004101F0: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
                                                          • Part of subcall function 004101F0: RegisterClassExW.USER32 ref: 004102C6
                                                          • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
                                                          • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
                                                          • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 00410454
                                                          • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 0041045E
                                                          • Part of subcall function 0040E1E0: _memset.LIBCMT ref: 0040E202
                                                          • Part of subcall function 0040E1E0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memset_wcscpy
                                                        • String ID: @GH$@GH$C:\Users\user\Desktop\0wxckB4Iba.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                        • API String ID: 2493088469-481579894
                                                        • Opcode ID: 69cfb0be49d24e5250ef6e64c59b5ea2b0a961f7c54b5140d3e7fdea8d41d4c7
                                                        • Instruction ID: f6e0ab4c143dd9a1f797559286fb6c41f0380d60009eb7dc722615656bf0e84e
                                                        • Opcode Fuzzy Hash: 69cfb0be49d24e5250ef6e64c59b5ea2b0a961f7c54b5140d3e7fdea8d41d4c7
                                                        • Instruction Fuzzy Hash: 0341F731618341ABD320F7A19C49BAF3BA4AB96704F04493FF941672D1DBBC9949C72E
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403871
                                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403887
                                                        • __wsplitpath.LIBCMT ref: 004038B2
                                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                        • _wcscpy.LIBCMT ref: 004038C7
                                                        • _wcscat.LIBCMT ref: 004038DC
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 004038EC
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                          • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,0040397D,?,?,00000010), ref: 00403F54
                                                          • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,00000010), ref: 00403F8B
                                                        • _wcscpy.LIBCMT ref: 004039C2
                                                        • _wcslen.LIBCMT ref: 00403A53
                                                        • _wcslen.LIBCMT ref: 00403AAA
                                                        Strings
                                                        • _, xrefs: 00403B48
                                                        • #include depth exceeded. Make sure there are no recursive includes, xrefs: 0042B87B
                                                        • Unterminated string, xrefs: 0042B9BA
                                                        • Error opening the file, xrefs: 0042B8AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpy$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_wcscatstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                        • API String ID: 4115725249-188983378
                                                        • Opcode ID: e410348e96554644cb024ebf95e8b2d2088fffc0e8404256067a24ee959a0054
                                                        • Instruction ID: dca64db042171ec5605b2d10b6a92a42a2076cc25022adee7b8115af8a15fc96
                                                        • Opcode Fuzzy Hash: e410348e96554644cb024ebf95e8b2d2088fffc0e8404256067a24ee959a0054
                                                        • Instruction Fuzzy Hash: 16D1D5B15083019AD710EF65C841AEB77E8AF95308F04492FF5C563292DB78DA49C7AB
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00434C12
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00434C4F
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00434C65
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00434C77
                                                        • FindClose.KERNEL32(00000000), ref: 00434C88
                                                        • FindClose.KERNEL32(00000000), ref: 00434C9C
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00434CB7
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00434CFE
                                                        • SetCurrentDirectoryW.KERNEL32(0048A090), ref: 00434D22
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00434D2A
                                                        • FindClose.KERNEL32(00000000), ref: 00434D35
                                                        • FindClose.KERNEL32(00000000), ref: 00434D43
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1409584000-438819550
                                                        • Opcode ID: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                                        • Instruction ID: 399dbb17912f16e5170155dcc5475d9346bc7ba5aa4a4c8a0ea4d4714b2c7a66
                                                        • Opcode Fuzzy Hash: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                                        • Instruction Fuzzy Hash: 4141D8726042086BD710EF64DC45AEFB3A8AAC9311F14592FFD54C3280EB79E915C7B9
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Timetime$Sleep
                                                        • String ID: BUTTON
                                                        • API String ID: 4176159691-3405671355
                                                        • Opcode ID: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                                        • Instruction ID: 32c89cc89acb3c111fc3cc5f781edb0c57d51ec263d79eeef99f8852f1a29925
                                                        • Opcode Fuzzy Hash: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                                        • Instruction Fuzzy Hash: CB21B7723843016BE330DB74FD4DF5A7B94A7A5B51F244876F600E6290D7A5D442876C
                                                        APIs
                                                          • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004392DE
                                                          • Part of subcall function 004392BC: GetLastError.KERNEL32 ref: 004392E4
                                                          • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0043930B
                                                          • Part of subcall function 0043928B: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004392A5
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,00000004,?,?,?,?), ref: 00445E4B
                                                        • _memset.LIBCMT ref: 00445E61
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00445E83
                                                        • GetLengthSid.ADVAPI32(?), ref: 00445E92
                                                        • GetAce.ADVAPI32(?,00000000,?,?,00000018), ref: 00445EDE
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00445EFB
                                                        • GetLengthSid.ADVAPI32(?,?,00000018), ref: 00445F11
                                                        • GetLengthSid.ADVAPI32(?,00000008,?,?,00000000,?,00000000), ref: 00445F39
                                                        • CopySid.ADVAPI32(00000000,?,00000000,?,00000000), ref: 00445F40
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?,?,00000000,?,00000000), ref: 00445F6E
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,00000000,?,00000000), ref: 00445F8B
                                                        • SetUserObjectSecurity.USER32(?,?,?), ref: 00445FA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                        • String ID:
                                                        • API String ID: 3490752873-0
                                                        • Opcode ID: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                                        • Instruction ID: 491154c1e478dcf6c9ac3cbca3c2c9e2645d4ee7bbdc2abf5fae4ada557f6fe4
                                                        • Opcode Fuzzy Hash: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                                        • Instruction Fuzzy Hash: 85519D71108301ABD610DF61CD84E6FB7E9AFC9B04F04491EFA869B242D778E909C76B
                                                        APIs
                                                        • OleInitialize.OLE32(00000000), ref: 0047AA03
                                                        • CLSIDFromProgID.OLE32(00000000,?), ref: 0047AA27
                                                        • CoCreateInstance.OLE32(?,00000000,00000005,004829C0,?), ref: 0047AAAA
                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0047AB6B
                                                        • _memset.LIBCMT ref: 0047AB7C
                                                        • _wcslen.LIBCMT ref: 0047AC68
                                                        • _memset.LIBCMT ref: 0047ACCD
                                                        • CoCreateInstanceEx.OLE32 ref: 0047AD06
                                                        • CoSetProxyBlanket.OLE32(004829D0,?,?,?,?,?,?,00000800), ref: 0047AD53
                                                        Strings
                                                        • NULL Pointer assignment, xrefs: 0047AD84
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstance_memset$BlanketFromProgProxySecurity_wcslen
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 1588287285-2785691316
                                                        • Opcode ID: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                                                        • Instruction ID: 16786b45dbc5194aa398acfc0f0ff3b91b98a178c64a073a91da7f4e0cb75f58
                                                        • Opcode Fuzzy Hash: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                                                        • Instruction Fuzzy Hash: 54B10DB15083409FD320EF65C881B9FB7E8BBC8744F108E2EF58997291D7759948CB66
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004364B9
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004364C0
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004364D6
                                                        • AdjustTokenPrivileges.ADVAPI32 ref: 004364FE
                                                        • GetLastError.KERNEL32 ref: 00436504
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 00436527
                                                        • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000001), ref: 00436557
                                                        • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 0043656A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                        • String ID: SeShutdownPrivilege
                                                        • API String ID: 2938487562-3733053543
                                                        • Opcode ID: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                                        • Instruction ID: b625d7910520021a286729d09db348b3c4b0b131b75d5259d4bd29649b467962
                                                        • Opcode Fuzzy Hash: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                                        • Instruction Fuzzy Hash: E021D5B02803017FF7149B64DD4AF6B3398EB48B10F948829FE09852D2D6BDE844973D
                                                        APIs
                                                        • __swprintf.LIBCMT ref: 00436162
                                                        • __swprintf.LIBCMT ref: 00436176
                                                          • Part of subcall function 0041353A: __woutput_l.LIBCMT ref: 0041358F
                                                        • __wcsicoll.LIBCMT ref: 00436185
                                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 004361A6
                                                        • LoadResource.KERNEL32(?,00000000), ref: 004361AE
                                                        • LockResource.KERNEL32(00000000), ref: 004361B5
                                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 004361DA
                                                        • LoadResource.KERNEL32(?,00000000), ref: 004361E4
                                                        • SizeofResource.KERNEL32(?,00000000), ref: 004361F0
                                                        • LockResource.KERNEL32(?), ref: 004361FD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll__woutput_l
                                                        • String ID:
                                                        • API String ID: 2406429042-0
                                                        • Opcode ID: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                                        • Instruction ID: 79d88324f8a28cdfdddc37bd7103cac5134eefaeeaedb246b69d205017f9fa0d
                                                        • Opcode Fuzzy Hash: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                                        • Instruction Fuzzy Hash: 82313432104210BFD700EF64ED88EAF77A9FB89304F00882BFA4196150E778D940CB68
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D522
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D593
                                                        • GetLastError.KERNEL32 ref: 0045D59D
                                                        • SetErrorMode.KERNEL32(?), ref: 0045D629
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                                        • Instruction ID: 49a1caac5541b587bc648ef7caa6256b54369420b38b3993b587487a6931f65b
                                                        • Opcode Fuzzy Hash: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                                        • Instruction Fuzzy Hash: BA31AD75A083009FC310EF55D98090BB7E1AF89315F448D6FF94997362D778E9068B6A
                                                        APIs
                                                        • MkParseDisplayName.OLE32(?,00000000,?,?), ref: 0047AF0F
                                                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                        • OleInitialize.OLE32(00000000), ref: 0047AE06
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • _wcslen.LIBCMT ref: 0047AE18
                                                        • CreateBindCtx.OLE32(00000000,?), ref: 0047AEC2
                                                        • CLSIDFromProgID.OLE32(00000000,?,?), ref: 0047AFCC
                                                        • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0047AFF9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CopyVariant$_wcslen$ActiveBindCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcscpy
                                                        • String ID: HH
                                                        • API String ID: 1915432386-2761332787
                                                        • Opcode ID: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                                                        • Instruction ID: 7e3b4e38c6064d991530b19baaff212313fd3e9d55f264e0ba959e8ba912c45c
                                                        • Opcode Fuzzy Hash: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                                                        • Instruction Fuzzy Hash: 6C915C71604301ABD710EB65CC85F9BB3E8AFC8714F10892EF64597291EB78E909CB5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DEFINE$`$h$h
                                                        • API String ID: 0-4194577831
                                                        • Opcode ID: 924177e0c3576f85a96b78a37b3c3cedf46843da4e7c3acb3e3d7f55582469aa
                                                        • Instruction ID: b1cbab3e2140d6a963e4b85c5b61650905c2e88cbb7a9c7ccaf19de07e543520
                                                        • Opcode Fuzzy Hash: 924177e0c3576f85a96b78a37b3c3cedf46843da4e7c3acb3e3d7f55582469aa
                                                        • Instruction Fuzzy Hash: 9802A1715083818FE725CF29C88076BBBE2BFD5304F28896EE89587342D779D849CB56
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000000), ref: 004648B0
                                                        • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,?,00000000), ref: 004648BE
                                                        • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648DA
                                                        • WSAGetLastError.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648E6
                                                        • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000005,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 0046492D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$bindclosesocketsocket
                                                        • String ID:
                                                        • API String ID: 2609815416-0
                                                        • Opcode ID: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
                                                        • Instruction ID: d240999dee57073d64b91b26c15bb406cb7727aead8f71c00845428af50f987f
                                                        • Opcode Fuzzy Hash: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
                                                        • Instruction Fuzzy Hash: C731CB712002009BD710FF2ADC81B6BB3E8EF85724F144A5FF594A72D2D779AC85876A
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00437043
                                                        • Process32FirstW.KERNEL32(00000000,00000002), ref: 00437050
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00437075
                                                        • __wsplitpath.LIBCMT ref: 004370A5
                                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                        • _wcscat.LIBCMT ref: 004370BA
                                                        • __wcsicoll.LIBCMT ref: 004370C8
                                                        • CloseHandle.KERNEL32(00000000,?), ref: 00437105
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                        • String ID:
                                                        • API String ID: 2547909840-0
                                                        • Opcode ID: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                                        • Instruction ID: d866d71778569fbbd99b025f777f77cc3db9ba9c83dfb601fa45888e96c7797d
                                                        • Opcode Fuzzy Hash: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                                        • Instruction Fuzzy Hash: 9C21A7B20083819BD735DB55C881BEFB7E8BB99304F00491EF5C947241EB79A589CB6A
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • FindFirstFileW.KERNEL32(?,?,?,?,?,00000000), ref: 0045217E
                                                        • Sleep.KERNEL32(0000000A,?,?,00000000), ref: 004521B2
                                                        • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 004522AC
                                                        • FindClose.KERNEL32(?,?,00000000), ref: 004522C3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNextSleep_wcslen
                                                        • String ID: *.*
                                                        • API String ID: 2693929171-438819550
                                                        • Opcode ID: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                                        • Instruction ID: e6452ff64139cddd5fd774ab19bf2199aa97b2a19dc0f7115334900b47d689b2
                                                        • Opcode Fuzzy Hash: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                                        • Instruction Fuzzy Hash: BD419D756083409FC314DF25C984A9FB7E4BF86305F04491FF98993291DBB8E949CB5A
                                                        APIs
                                                        • OpenClipboard.USER32(?), ref: 0046C635
                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
                                                        • GetClipboardData.USER32(0000000D), ref: 0046C64F
                                                        • CloseClipboard.USER32 ref: 0046C65D
                                                        • GlobalLock.KERNEL32(00000000), ref: 0046C688
                                                        • CloseClipboard.USER32 ref: 0046C692
                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
                                                        • GetClipboardData.USER32(00000001), ref: 0046C6DD
                                                        • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
                                                        • CloseClipboard.USER32 ref: 0046C866
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
                                                        • String ID: HH
                                                        • API String ID: 589737431-2761332787
                                                        • Opcode ID: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
                                                        • Instruction ID: 5556deb4c8197336e1b92b5e2a85e957832ef7964462d916cb468ff193882e13
                                                        • Opcode Fuzzy Hash: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
                                                        • Instruction Fuzzy Hash: 7301F5762042005FC300AFB9ED45B6A7BA4EF59704F04097FF980A72C1EBB1E915C7AA
                                                        APIs
                                                        • __wcsicoll.LIBCMT ref: 0043643C
                                                        • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 00436452
                                                        • __wcsicoll.LIBCMT ref: 00436466
                                                        • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043647C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __wcsicollmouse_event
                                                        • String ID: DOWN
                                                        • API String ID: 1033544147-711622031
                                                        • Opcode ID: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                                        • Instruction ID: 8a73d33e481528181e274ae5662561dddcd8f7088196b39fde8242b6fe69d79f
                                                        • Opcode Fuzzy Hash: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                                        • Instruction Fuzzy Hash: 75E0927558872039FC4036253C02FFB174CAB66796F018116FE00D1291EA586D865BBD
                                                        APIs
                                                          • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                                        • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 00474213
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00474233
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 4170576061-0
                                                        • Opcode ID: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
                                                        • Instruction ID: 44a7e99483396e6262e636993c5e510db402c36a24f0b6146f21617b09e75fab
                                                        • Opcode Fuzzy Hash: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
                                                        • Instruction Fuzzy Hash: B6412C7164030067E720BB3A8C83F5A72D89F40728F144D5EF954BB2C3D6BAAD45475D
                                                        APIs
                                                        • GetCursorPos.USER32(004A83D8), ref: 0045636A
                                                        • ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                                        • GetAsyncKeyState.USER32(?), ref: 004563D0
                                                        • GetAsyncKeyState.USER32(?), ref: 004563DC
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456430
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorLongScreenWindow
                                                        • String ID:
                                                        • API String ID: 3539004672-0
                                                        • Opcode ID: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                                        • Instruction ID: 0eacbf52c9ff4b21db6d2500407d28a57be55752a0539e191fb639d8ee6a043b
                                                        • Opcode Fuzzy Hash: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                                        • Instruction Fuzzy Hash: 8E416071108341ABD724DF55CD84EBBB7E9EF86725F540B0EB8A543281C734A848CB6A
                                                        APIs
                                                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                        • IsWindowVisible.USER32 ref: 00477314
                                                        • IsWindowEnabled.USER32 ref: 00477324
                                                        • GetForegroundWindow.USER32(?,?,?,00000001,?,?), ref: 00477331
                                                        • IsIconic.USER32 ref: 0047733F
                                                        • IsZoomed.USER32 ref: 0047734D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                                        • Instruction ID: c753cb395bd8887e5e04db90522a3107d7308fd2cfa588f53a4db7a4177bc043
                                                        • Opcode Fuzzy Hash: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                                        • Instruction Fuzzy Hash: 351172327041119BE3209B26DD05B9FB7A8AF91310F05882EFC49E7250D7B8EC42D7A9
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000,75573220,00000000,00000000,00442E95,?,?,?), ref: 00436D4F
                                                        • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000), ref: 00436D8C
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000000), ref: 00436D93
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleTime
                                                        • String ID:
                                                        • API String ID: 3397143404-0
                                                        • Opcode ID: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                                        • Instruction ID: bce1a9391340f9688fe0750810cd2cb1b104417d8b3c1e96578cdf6de8724fbd
                                                        • Opcode Fuzzy Hash: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                                        • Instruction Fuzzy Hash: A4F0C83634132077E5301A69AC8DFCF276CABDAB32F20452EF741A61C083D51445977D
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _strncmp
                                                        • String ID: ACCEPT$^$h
                                                        • API String ID: 909875538-4263704089
                                                        • Opcode ID: adbbb77bd847cefbadd23aa8e42bde8f813033e7c46a43322acc698efb747d92
                                                        • Instruction ID: 72a2cba82410d8b1d90f72ff5cad5771b474d57714a55a9933f2c727144888ce
                                                        • Opcode Fuzzy Hash: adbbb77bd847cefbadd23aa8e42bde8f813033e7c46a43322acc698efb747d92
                                                        • Instruction Fuzzy Hash: AE22A0746083818FE725CF29C48076BBBE2BFC9304F24896EE8D587351D779984ACB56
                                                        APIs
                                                        • _set_new_mode.LIBCMT ref: 0040D88C
                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D8B9
                                                        • FreeLibrary.KERNEL32(?), ref: 0040D8CE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: FreeInfoLibraryParametersSystem_set_new_mode
                                                        • String ID: Wu
                                                        • API String ID: 1188159508-4083010176
                                                        • Opcode ID: 06ca62d5f0ac41005a4bed089aefec56480100fd5cca74c1e28fe2d3c932602c
                                                        • Instruction ID: 2b4412acdce639bfbf0f9e0c9ecf3f694f94d165ded01d265c3c64edb54a61d9
                                                        • Opcode Fuzzy Hash: 06ca62d5f0ac41005a4bed089aefec56480100fd5cca74c1e28fe2d3c932602c
                                                        • Instruction Fuzzy Hash: C2215EB19183009FC700EF56D88150ABBE4FB98354F44497EF849A72A2D735A945CB9A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ERCP$VUUU$VUUU$VUUU
                                                        • API String ID: 0-2165971703
                                                        • Opcode ID: fe5f619ecbbb89e409f3ebcf557090f4afc22d0cdf4dbad8df8e547bb5c0b5b7
                                                        • Instruction ID: 514654dd073cfe12bfc68f6c44a091d7a3824994b709b832431b3f3de6bbd106
                                                        • Opcode Fuzzy Hash: fe5f619ecbbb89e409f3ebcf557090f4afc22d0cdf4dbad8df8e547bb5c0b5b7
                                                        • Instruction Fuzzy Hash: 5562D3716087818BE734CF18C8807ABB7E1EBC6314F154A2FE49986390E779D949CB5B
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045C9BE
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0045CA1B
                                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CA4A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNext
                                                        • String ID:
                                                        • API String ID: 3541575487-0
                                                        • Opcode ID: 14602e3ddb85434cb4a191148b4ac58dc13c9e22f939418703ff5d8e88b69fcb
                                                        • Instruction ID: 18858b47483a38653cd59612877c1399ad483e9f26b014a4aa46912757e3bc7b
                                                        • Opcode Fuzzy Hash: 14602e3ddb85434cb4a191148b4ac58dc13c9e22f939418703ff5d8e88b69fcb
                                                        • Instruction Fuzzy Hash: EC41CE756003009FC720EF79D880A9BB3E4FF89315F208A6EED698B391D775A844CB95
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(00000001,00000000), ref: 00436AEF
                                                        • FindFirstFileW.KERNEL32(00000001,?), ref: 00436B00
                                                        • FindClose.KERNEL32(00000000), ref: 00436B13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirst
                                                        • String ID:
                                                        • API String ID: 48322524-0
                                                        • Opcode ID: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                                        • Instruction ID: 417b6d6de692ea6945bae3bf725251b28653fd5bce93257cef0f58e2a105c1b1
                                                        • Opcode Fuzzy Hash: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                                        • Instruction Fuzzy Hash: 23E02236804418678600AB7CAC0C4EE779CDB0A335F100B96FE38C21D0D775A9408FEA
                                                        APIs
                                                        • __time64.LIBCMT ref: 004433A2
                                                          • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                                          • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Time$FileSystem__aulldiv__time64
                                                        • String ID: rJ
                                                        • API String ID: 2893107130-1865492326
                                                        • Opcode ID: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                                        • Instruction ID: ebc1a5536eae3429eadb0b33e849de59894c076497330b79c1ff8485d89898ec
                                                        • Opcode Fuzzy Hash: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                                        • Instruction Fuzzy Hash: B721A2336205108BF321CF36CC41652B7E7EBE0314F268A6AE4A5973C5CA797906CB98
                                                        APIs
                                                        • __time64.LIBCMT ref: 004433A2
                                                          • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                                          • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Time$FileSystem__aulldiv__time64
                                                        • String ID: rJ
                                                        • API String ID: 2893107130-1865492326
                                                        • Opcode ID: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                                        • Instruction ID: 4b4e0c3debee0a45c2bc781276f994e79ac96c452fb6cf924f1e6ade5adf298d
                                                        • Opcode Fuzzy Hash: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                                        • Instruction Fuzzy Hash: E82187336345108BF321CF36CC4165277E3EBE0314B258B6AD4A5973C5CA797906CB88
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(?,?,?,?,00000000,00000000), ref: 004428C2
                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 004428F9
                                                          • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                        • String ID:
                                                        • API String ID: 901099227-0
                                                        • Opcode ID: 0771251b70b9bd68c35fac6f7da5b5f16004994504cb59d35d549d3fc14a9ba4
                                                        • Instruction ID: 2c15810e60b1cb59304632cc8162977c32d0240baa2dcf3c2cd6ef22f942a6bb
                                                        • Opcode Fuzzy Hash: 0771251b70b9bd68c35fac6f7da5b5f16004994504cb59d35d549d3fc14a9ba4
                                                        • Instruction Fuzzy Hash: 452174B12043016BF220EF56DD45FAFB3E8ABD4715F40492EF285A6180D7B8E949C76A
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DDA1
                                                        • FindClose.KERNEL32(00000000), ref: 0045DDDD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                                        • Instruction ID: 3577cc1601137e614a3334ffa73c6d258275d41fe8d72aaca367a27ef3e2a016
                                                        • Opcode Fuzzy Hash: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                                        • Instruction Fuzzy Hash: DE11E5766002049FD710EF6ADC89A5AF7E5EF84325F10892EF958D7281CB75E8048B94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0vH$HH
                                                        • API String ID: 0-728391547
                                                        • Opcode ID: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                                        • Instruction ID: 538a6706abcc28c04bdc151be30d2aa4e2083a8dfdfa6c30a7857f36827e6882
                                                        • Opcode Fuzzy Hash: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                                        • Instruction Fuzzy Hash: 60E1BE725143109FC310EF25C881A9FB7E5AFC4708F108D2EF589AB281D779E946CB9A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _memset
                                                        • String ID:
                                                        • API String ID: 2102423945-0
                                                        • Opcode ID: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                                        • Instruction ID: fac722ae1e10b3ad9494cda40f9fb3e9e62b3c26aea04ddfc6562ea9d2065ebb
                                                        • Opcode Fuzzy Hash: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                                        • Instruction Fuzzy Hash: C512B4B7B983194FDB48DEE4DCC169573E1FB98304F09A43C9A15C7306F6E8AA094794
                                                        APIs
                                                        • DefDlgProcW.USER32(?,?,?,?,004A83D8,?), ref: 0047E22C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Proc
                                                        • String ID:
                                                        • API String ID: 2346855178-0
                                                        • Opcode ID: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                                        • Instruction ID: e1c03c818efbd3cbf3664a0c3e659178dbc9a05004c0f073233894ce1d713c90
                                                        • Opcode Fuzzy Hash: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                                        • Instruction Fuzzy Hash: 4EB1E63330602429E114916BBC88EBFBB9CD7D677BB208B7FF142C1582DB5B6425A179
                                                        APIs
                                                        • BlockInput.USER32(00000001), ref: 0045A272
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: BlockInput
                                                        • String ID:
                                                        • API String ID: 3456056419-0
                                                        • Opcode ID: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                                        • Instruction ID: 5d782454ef4d0180448527013755d2523f66e5fc327f68786c1d80a86620ac83
                                                        • Opcode Fuzzy Hash: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                                        • Instruction Fuzzy Hash: D2E04F752043019BC700EF71C545A5BB7E4AF94314F108C6EF845A7351D775AC45CB66
                                                        APIs
                                                        • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 0043918E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: LogonUser
                                                        • String ID:
                                                        • API String ID: 1244722697-0
                                                        • Opcode ID: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                                        • Instruction ID: 63114e5cfb2c4979e73f5d19eacf740c811f86df1a08bc2cb556a5e36cce81ff
                                                        • Opcode Fuzzy Hash: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                                        • Instruction Fuzzy Hash: 8DD0ECB52686066FD204CB24D846E2B77E9A7C4701F008A0CB196D2280C670D805CA32
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID:
                                                        • API String ID: 2645101109-0
                                                        • Opcode ID: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                                        • Instruction ID: 8011c19b6c32d183c263453b2018abc548473ce9ed5616c99acac4896e71f792
                                                        • Opcode Fuzzy Hash: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                                        • Instruction Fuzzy Hash: F6E08C322083058FC310EF55F8405ABB390EB94311F004C3FE64AA2191DA79920EDFAB
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_00021FEC), ref: 00422033
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                                        • Instruction ID: 3275b40964251646410af8875a24301f93fa315c26af6adae0ca3d0f7a721f84
                                                        • Opcode Fuzzy Hash: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                                        • Instruction Fuzzy Hash: CD9002743511144A4A011BB16E5D90925D46A586067920875B411C4064DB9840019619
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                        • Instruction ID: b3f199f19983f506b623bfe7955a95149e6efe4e98ce3416cc40fa12ddcf4508
                                                        • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                        • Instruction Fuzzy Hash: 46D19073C0A9B30A8735812D42582BFEE626FD578131EC3E29CD07F38AD26B5DA195D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                        • Instruction ID: c47bdb3f9c9e38c5d46ddb9e43dedaf70276048770aeb58bd274f21c588a824b
                                                        • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                        • Instruction Fuzzy Hash: 1CD19073D1A9B30A8735852D42581AFEE626FD578031EC3E2CCD07F38AD16B5DA191D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                        • Instruction ID: ac15b8da1a4b082d71a0b082c8349c97121379a14580263daf363e6ab8f75410
                                                        • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                        • Instruction Fuzzy Hash: 87C18173C0A9B30A8736812D42641AFEE626FD579031FC3E2CCD47F38A91AB5DA195D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                        • Instruction ID: aa957cafbedeae1199dea6a597ba911d219650f283d164fb65797e90308ef47b
                                                        • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                        • Instruction Fuzzy Hash: 5FC18E73D0A9B30A8735812D42581AFEE626FD578031EC3E28CE46F38ED26F5DA195D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1424518229.0000000003FBC000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FBC000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3fbc000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction ID: b90586cea6215324c0c07215facb9f2d1c9efe7160a6e607aaa24646f645f8ca
                                                        • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction Fuzzy Hash: DB41A4B1D1051CDBCF48CFADC991AEEBBF1AF88201F548299D516AB345D730AB41DB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1424518229.0000000003FBC000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FBC000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3fbc000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction ID: aa15fc97c998fdaf3edaa7508820fe4306dfda4e33b25b99d0bfb306fa35efc6
                                                        • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction Fuzzy Hash: 36019278E11209EFCB44DF99C9909AEF7B6FB48310F208599DC09A7705D730AE41DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1424518229.0000000003FBC000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FBC000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3fbc000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction ID: fba54459ff5129a460aa86802cf78b4a0b3fbe26c08fc0c259f7e819a39ce7b8
                                                        • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction Fuzzy Hash: 370180B9E00209EFCB44DF99C9909AEF7B6FB48210F208599E809A7715D730AE51DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                                        • Instruction ID: b8cfd58d412160527e66ace840abba843d94ac3f5b06779728c9fe736b8606cc
                                                        • Opcode Fuzzy Hash: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                                        • Instruction Fuzzy Hash: ECD012F621844146F33144D866C0BD100437344310FB58C276005CEBC1C0DDECD6C229
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1424518229.0000000003FBC000.00000040.00000020.00020000.00000000.sdmp, Offset: 03FBC000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3fbc000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                        • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                        APIs
                                                        • DeleteObject.GDI32(?), ref: 004593D7
                                                        • DeleteObject.GDI32(?), ref: 004593F1
                                                        • DestroyWindow.USER32(?), ref: 00459407
                                                        • GetDesktopWindow.USER32 ref: 0045942A
                                                        • GetWindowRect.USER32(00000000), ref: 00459431
                                                        • SetRect.USER32(50000001,00000000,00000000,000001F4,?), ref: 00459568
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00459577
                                                        • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,?,?,50000001,?,?,00000000,00000000), ref: 004595BB
                                                        • GetClientRect.USER32(00000000,?), ref: 004595C8
                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 00459615
                                                        • CreateFileW.KERNEL32(00000000,?,80000000,00000000,00000000,00000003,00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459635
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459654
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 0045965F
                                                        • GlobalLock.KERNEL32(00000000), ref: 00459668
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459678
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0045967F
                                                        • CloseHandle.KERNEL32(00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459686
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,50000001,?,?,00000000,00000000,00000000), ref: 00459694
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,000001F4), ref: 004596AD
                                                        • GlobalFree.KERNEL32(00000000), ref: 004596C0
                                                        • CopyImage.USER32(000000FF,00000000,00000000,00000000,00002000), ref: 004596EF
                                                        • SendMessageW.USER32(00000000,00000172,00000000,000000FF), ref: 00459712
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,50000001,?,?,00000000,00000000,00000000), ref: 0045973D
                                                        • ShowWindow.USER32(?,00000004,?,50000001,?,?,00000000,00000000,00000000), ref: 0045974B
                                                        • CreateWindowExW.USER32(00000000,static,00000000,?,?,0000000B,0000000B,?,?,?,00000000,00000000), ref: 0045979C
                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004597AD
                                                        • GetStockObject.GDI32(00000011), ref: 004597B7
                                                        • SelectObject.GDI32(00000000,00000000), ref: 004597BF
                                                        • GetTextFaceW.GDI32(00000000,00000040,00000190,?,50000001,?,?,00000000,00000000,00000000), ref: 004597CD
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004597D6
                                                        • DeleteDC.GDI32(00000000), ref: 004597E1
                                                        • _wcslen.LIBCMT ref: 00459800
                                                        • _wcscpy.LIBCMT ref: 0045981F
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 004598BB
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004598D0
                                                        • GetDC.USER32(?), ref: 004598DE
                                                        • SelectObject.GDI32(00000000,?), ref: 004598EE
                                                        • SelectObject.GDI32(00000000,?), ref: 00459919
                                                        • ReleaseDC.USER32(?,00000000), ref: 00459925
                                                        • MoveWindow.USER32(?,0000000B,?,?,?,00000001), ref: 00459943
                                                        • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 00459951
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                        • API String ID: 4040870279-2373415609
                                                        • Opcode ID: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                                        • Instruction ID: fce7466cc8f2b4b34a2e278d60cb4f704f90ff1017bfb666dbfc83d8aba9d67a
                                                        • Opcode Fuzzy Hash: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                                        • Instruction Fuzzy Hash: 3F028C70204301EFD714DF64DE89F2BB7A8AB84705F104A2DFA45AB2D2D7B4E805CB69
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 1038674560-3360698832
                                                        • Opcode ID: 87a66eadcaf8420a9e8e1157d1f7c7fd58aef90dc088af7a86e197dee8fb1ec4
                                                        • Instruction ID: b6083b7aed1673b33e689ff2aa7e8f17f47d7310e90ec65f4167159f85ee96f3
                                                        • Opcode Fuzzy Hash: 87a66eadcaf8420a9e8e1157d1f7c7fd58aef90dc088af7a86e197dee8fb1ec4
                                                        • Instruction Fuzzy Hash: 5A611471B4071076EA306A229C46FAB735CDF14345F50052FFC01A628BE7ADDA4A86EE
                                                        APIs
                                                        • GetSysColor.USER32(0000000E), ref: 00433D81
                                                        • SetTextColor.GDI32(?,00000000), ref: 00433D89
                                                        • GetSysColor.USER32(00000012), ref: 00433DA3
                                                        • SetTextColor.GDI32(?,?), ref: 00433DAB
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00433DBF
                                                        • GetSysColor.USER32(0000000F), ref: 00433DCB
                                                        • CreateSolidBrush.GDI32(?), ref: 00433DD4
                                                        • GetSysColor.USER32(00000011), ref: 00433DEB
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                                                        • SelectObject.GDI32(?,00000000), ref: 00433E0D
                                                        • SetBkColor.GDI32(?,?), ref: 00433E19
                                                        • SelectObject.GDI32(?,?), ref: 00433E29
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00433E54
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                                                        • GetWindowLongW.USER32 ref: 00433E8A
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                                                        • GetWindowTextW.USER32(00000000,00000000,00000105), ref: 00433EE1
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00433F13
                                                        • DrawFocusRect.USER32(?,?), ref: 00433F1F
                                                        • GetSysColor.USER32(00000011), ref: 00433F2E
                                                        • SetTextColor.GDI32(?,00000000), ref: 00433F36
                                                        • DrawTextW.USER32(?,?,000000FF,?,?), ref: 00433F4E
                                                        • SelectObject.GDI32(?,?), ref: 00433F63
                                                        • DeleteObject.GDI32(?), ref: 00433F70
                                                        • SelectObject.GDI32(?,?), ref: 00433F78
                                                        • DeleteObject.GDI32(00000000), ref: 00433F7B
                                                        • SetTextColor.GDI32(?,?), ref: 00433F83
                                                        • SetBkColor.GDI32(?,?), ref: 00433F8F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1582027408-0
                                                        • Opcode ID: 697ef1e2b469c7a94178de5208286552364449c38c8500f3df1fcdb24db8d4eb
                                                        • Instruction ID: aa454ab644ffbff4d2185aee23397a25bdbdaef3ad5a75b83a3ebbbeed3afe32
                                                        • Opcode Fuzzy Hash: 697ef1e2b469c7a94178de5208286552364449c38c8500f3df1fcdb24db8d4eb
                                                        • Instruction Fuzzy Hash: 53710570508340AFD304DF68DD88A6FBBF9FF89711F104A2DFA5592290D7B4E9418B6A
                                                        APIs
                                                        • OpenClipboard.USER32(?), ref: 0046C635
                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
                                                        • GetClipboardData.USER32(0000000D), ref: 0046C64F
                                                        • CloseClipboard.USER32 ref: 0046C65D
                                                        • GlobalLock.KERNEL32(00000000), ref: 0046C688
                                                        • CloseClipboard.USER32 ref: 0046C692
                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
                                                        • GetClipboardData.USER32(00000001), ref: 0046C6DD
                                                        • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
                                                        • CloseClipboard.USER32 ref: 0046C866
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
                                                        • String ID: HH
                                                        • API String ID: 589737431-2761332787
                                                        • Opcode ID: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
                                                        • Instruction ID: ccec0c76267f611a980a6192e38ed766f4c6ddce8b7f15b38bc446a2cb1d96e7
                                                        • Opcode Fuzzy Hash: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
                                                        • Instruction Fuzzy Hash: 4D61E5722003019BD310EF65DD86B5E77A8EF54715F00483EFA41E72D1EBB5D9048BAA
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00456692
                                                        • GetDesktopWindow.USER32 ref: 004566AA
                                                        • GetWindowRect.USER32(00000000), ref: 004566B1
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0045670D
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456720
                                                        • DestroyWindow.USER32(?), ref: 00456731
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456779
                                                        • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00456797
                                                        • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567C0
                                                        • SendMessageW.USER32(?,00000421,?,?), ref: 004567D8
                                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004567EE
                                                        • IsWindowVisible.USER32(?), ref: 00456812
                                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 0045682E
                                                        • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 00456843
                                                        • GetWindowRect.USER32(?,?), ref: 0045685C
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00456880
                                                        • GetMonitorInfoW.USER32 ref: 00456894
                                                        • CopyRect.USER32(?,?), ref: 004568A8
                                                        • SendMessageW.USER32(?,00000412,00000000), ref: 0045690A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                        • String ID: ($,$tooltips_class32
                                                        • API String ID: 541082891-3320066284
                                                        • Opcode ID: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                                        • Instruction ID: 3987ef5f26dee50c6234681dd74380f3ee0746d74ffcadc96223edc745891050
                                                        • Opcode Fuzzy Hash: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                                        • Instruction Fuzzy Hash: 33B18EB0604341AFD714DF64C984B6BB7E5EF88704F408D2DF989A7292D778E848CB5A
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00454DCF
                                                        • _wcslen.LIBCMT ref: 00454DE2
                                                        • __wcsicoll.LIBCMT ref: 00454DEF
                                                        • _wcslen.LIBCMT ref: 00454E04
                                                        • __wcsicoll.LIBCMT ref: 00454E11
                                                        • _wcslen.LIBCMT ref: 00454E24
                                                        • __wcsicoll.LIBCMT ref: 00454E31
                                                          • Part of subcall function 004115D0: __wcsicmp_l.LIBCMT ref: 00411657
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00454E65
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,?,?,?,?,?,?,?,00000000), ref: 00454E79
                                                        • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454EB7
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00454EFB
                                                        • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454F2C
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00454F37
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,?,00000001), ref: 00454F94
                                                        • DestroyIcon.USER32(?), ref: 00454FA2
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00454FC0
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00454FCC
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00454FF1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
                                                        • String ID: .dll$.exe$.icl$Wu
                                                        • API String ID: 2511167534-3157294790
                                                        • Opcode ID: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                                        • Instruction ID: 777b7c61fe84a0ac0f88e3bb9536c5d4e291b97e4b5026f6b39318954af55ba4
                                                        • Opcode Fuzzy Hash: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                                        • Instruction Fuzzy Hash: D461D9711043016AE620DF659D85F7B73ECEF84B0AF00481EFE81D5182E7B9A989C77A
                                                        APIs
                                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00436B4E
                                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000), ref: 00436B73
                                                        • _wcslen.LIBCMT ref: 00436B79
                                                        • _wcscpy.LIBCMT ref: 00436B9F
                                                        • _wcscat.LIBCMT ref: 00436BC0
                                                        • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00436BE7
                                                        • _wcscat.LIBCMT ref: 00436C2A
                                                        • _wcscat.LIBCMT ref: 00436C31
                                                        • __wcsicoll.LIBCMT ref: 00436C4B
                                                        • _wcsncpy.LIBCMT ref: 00436C62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                        • API String ID: 1503153545-1459072770
                                                        • Opcode ID: 4bf5914395717010b0ea9e2d69638f6034391d2624482ee6cf2f9dbb9f61e865
                                                        • Instruction ID: f4118b49cd66f9fee818cdfc0bae26735a4a754b0a3131160812af9443992caa
                                                        • Opcode Fuzzy Hash: 4bf5914395717010b0ea9e2d69638f6034391d2624482ee6cf2f9dbb9f61e865
                                                        • Instruction Fuzzy Hash: B54115B264020137D200B7269C83EFF735CDE99715F54091FFE45A2253FA2EA69642BE
                                                        APIs
                                                          • Part of subcall function 004431E0: __time64.LIBCMT ref: 004431EA
                                                        • _fseek.LIBCMT ref: 004527FC
                                                        • __wsplitpath.LIBCMT ref: 0045285C
                                                        • _wcscpy.LIBCMT ref: 00452871
                                                        • _wcscat.LIBCMT ref: 00452886
                                                        • __wsplitpath.LIBCMT ref: 004528B0
                                                        • _wcscat.LIBCMT ref: 004528C8
                                                        • _wcscat.LIBCMT ref: 004528DD
                                                        • __fread_nolock.LIBCMT ref: 00452914
                                                        • __fread_nolock.LIBCMT ref: 00452925
                                                        • __fread_nolock.LIBCMT ref: 00452944
                                                        • __fread_nolock.LIBCMT ref: 00452955
                                                        • __fread_nolock.LIBCMT ref: 00452976
                                                        • __fread_nolock.LIBCMT ref: 00452987
                                                        • __fread_nolock.LIBCMT ref: 00452998
                                                        • __fread_nolock.LIBCMT ref: 004529A9
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                                          • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                                          • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                                        • __fread_nolock.LIBCMT ref: 00452A39
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                                        • String ID:
                                                        • API String ID: 2054058615-0
                                                        • Opcode ID: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                                        • Instruction ID: 66779ec6e5012556871fefb3c18d5d4f0449fb8b445ab61f685bb60241e2a5ae
                                                        • Opcode Fuzzy Hash: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                                        • Instruction Fuzzy Hash: 16C14EB2508340ABD320DF65C881EEBB7E8EFC9714F444D2FF68987241E6799544CBA6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 832d7dfe82571d46151d64c4ba74b7ae12496bc5cddea04242c0c379dd164914
                                                        • Instruction ID: a4e6889c8706d2a682ad3cc8acca51b009283e1ae9b51da70db0806919efebf9
                                                        • Opcode Fuzzy Hash: 832d7dfe82571d46151d64c4ba74b7ae12496bc5cddea04242c0c379dd164914
                                                        • Instruction Fuzzy Hash: 95C104723403416BF3209B64DC46FBBB794EB95321F04453FFA45D62C1EBBA9409876A
                                                        APIs
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • GetWindowRect.USER32(?,?), ref: 004701EA
                                                        • GetClientRect.USER32(?,?), ref: 004701FA
                                                        • GetSystemMetrics.USER32(00000007), ref: 00470202
                                                        • GetSystemMetrics.USER32(00000008), ref: 00470216
                                                        • GetSystemMetrics.USER32(00000004), ref: 00470238
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047026B
                                                        • GetSystemMetrics.USER32(00000007), ref: 00470273
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004702A0
                                                        • GetSystemMetrics.USER32(00000008), ref: 004702A8
                                                        • GetSystemMetrics.USER32(00000004), ref: 004702CF
                                                        • SetRect.USER32(?,00000000,00000000,?,?), ref: 004702F1
                                                        • AdjustWindowRectEx.USER32(?,?,00000000,000000FF), ref: 00470304
                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 0047033E
                                                        • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00470356
                                                        • GetClientRect.USER32(?,?), ref: 00470371
                                                        • GetStockObject.GDI32(00000011), ref: 00470391
                                                        • SendMessageW.USER32(?,00000030,00000000), ref: 0047039D
                                                        • SetTimer.USER32(00000000,00000000,00000028,Function_00061E7F), ref: 004703C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 867697134-248962490
                                                        • Opcode ID: 0d702e1f111dc4b461eb7f98f3a5a74387d5f37c8fb6fd827a42ca67ae032642
                                                        • Instruction ID: 96ed3905d942d8c5c267f8207effb08aff50268186fc7250a269a1908d1679c9
                                                        • Opcode Fuzzy Hash: 0d702e1f111dc4b461eb7f98f3a5a74387d5f37c8fb6fd827a42ca67ae032642
                                                        • Instruction Fuzzy Hash: 27B19F71205301AFD324DF68DD45B6BB7E4FB88710F108A2EFA9587290DBB5E844CB5A
                                                        APIs
                                                        • SetWindowPos.USER32(004A83D8,00000000,00000000,00000000,00000000,00000000,00000013,004A83D8,?,?), ref: 0044880A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window
                                                        • String ID: 0
                                                        • API String ID: 2353593579-4108050209
                                                        • Opcode ID: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                                        • Instruction ID: 13976ff69904029c6bcd7d6129a783336058688c161485e0dcc644b2654616cc
                                                        • Opcode Fuzzy Hash: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                                        • Instruction Fuzzy Hash: 94B19DB02443419FF324CF14C889BABBBE4EB89744F14491EF991972D1DBB8E845CB5A
                                                        APIs
                                                        • GetSysColor.USER32 ref: 0044A11D
                                                        • GetClientRect.USER32(?,?), ref: 0044A18D
                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A1A6
                                                        • GetWindowDC.USER32(?), ref: 0044A1B3
                                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A1C6
                                                        • ReleaseDC.USER32(?,00000000), ref: 0044A1D6
                                                        • GetSysColor.USER32(0000000F), ref: 0044A1EC
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0044A207
                                                        • GetSysColor.USER32(0000000F), ref: 0044A216
                                                        • GetSysColor.USER32(00000005), ref: 0044A21E
                                                        • GetWindowDC.USER32 ref: 0044A277
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A28A
                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 0044A29F
                                                        • GetPixel.GDI32(00000000,00000000,?), ref: 0044A2B4
                                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A2D0
                                                        • ReleaseDC.USER32(?,00000000), ref: 0044A2D8
                                                        • SetTextColor.GDI32(00000000,?), ref: 0044A2F6
                                                        • SetBkMode.GDI32(00000000,00000001), ref: 0044A30A
                                                        • GetStockObject.GDI32(00000005), ref: 0044A312
                                                        • SetBkColor.GDI32(00000000,00000000), ref: 0044A328
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                        • String ID:
                                                        • API String ID: 1744303182-0
                                                        • Opcode ID: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                                        • Instruction ID: f407f88e1fc9bdd08975b2e96734b256c85d8f08b0ead5e1f8dbf5832e348edb
                                                        • Opcode Fuzzy Hash: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                                        • Instruction Fuzzy Hash: AD6148315442016BE3209B388C88BBFB7A4FB49324F54079EF9A8973D0D7B99C51D76A
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll$__wcsnicmp
                                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                        • API String ID: 790654849-1810252412
                                                        • Opcode ID: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                                        • Instruction ID: 1b62209f2aa4de5792947d5a3aa61dcd1c874d3672784017b8f4b2c72f71c34c
                                                        • Opcode Fuzzy Hash: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                                        • Instruction Fuzzy Hash: 7A3193B1644301A7CA00FA61DC83F5B73A85F54759F100A3FB955B61D6FA6CEA0C862F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: >>>AUTOIT SCRIPT<<<$\
                                                        • API String ID: 0-1896584978
                                                        • Opcode ID: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
                                                        • Instruction ID: e6fbcda15cb9520e0e34bfac0f9750edaedb1b44b840e2dcfb1a2c219c195b9a
                                                        • Opcode Fuzzy Hash: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
                                                        • Instruction Fuzzy Hash: 907186B2504300ABC720EB65C885FEBB3E8AF94714F148D1FF58997142E679E648C75A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: InitVariant
                                                        • String ID:
                                                        • API String ID: 1927566239-0
                                                        • Opcode ID: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                                        • Instruction ID: b17386a2766a1a739d91313a8bf0106a5dd250ff49ec0cac6ee5761d63536315
                                                        • Opcode Fuzzy Hash: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                                        • Instruction Fuzzy Hash: 87A1F5766146019FC300EF65D88499FB7AAFF85315F408D3EFA49C3211D77AD4098BAA
                                                        APIs
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • GetForegroundWindow.USER32(?,?), ref: 0046D7C1
                                                        • GetForegroundWindow.USER32 ref: 0046DBA4
                                                        • IsWindow.USER32(?), ref: 0046DBDE
                                                        • GetDesktopWindow.USER32 ref: 0046DCB5
                                                        • EnumChildWindows.USER32(00000000), ref: 0046DCBC
                                                        • EnumWindows.USER32(00460772,?), ref: 0046DCC4
                                                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop
                                                        • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                        • API String ID: 1322021666-1919597938
                                                        • Opcode ID: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                                        • Instruction ID: 252cd24da08a8cddfda52e39780f3f39bafd894638fb43d2866a45805a666b3e
                                                        • Opcode Fuzzy Hash: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                                        • Instruction Fuzzy Hash: 96F1C571D143409BCB00EF61C881EAB73A4BF95308F44496FF9456B286E77DE909CB6A
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll$IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2485277191-404129466
                                                        • Opcode ID: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                                        • Instruction ID: 3fdcc892c2a25cebf9aff257507665a297d4e16c4260cb8f6e9492a672fb13e0
                                                        • Opcode Fuzzy Hash: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                                        • Instruction Fuzzy Hash: CB2128B6B08301A7D610A725BC05FDF27489FA8365F004C2BF941E2283F3A8A45583BD
                                                        APIs
                                                        • CompareStringW.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428611
                                                        • GetLastError.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428627
                                                        • strncnt.LIBCMT ref: 00428646
                                                        • strncnt.LIBCMT ref: 0042865A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: strncnt$CompareErrorLastString
                                                        • String ID:
                                                        • API String ID: 1776594460-0
                                                        • Opcode ID: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                                        • Instruction ID: 056e5a993d73ec50dc3c8e072878bb631c9b69e1f80941a2a69bbd8adeb14d7f
                                                        • Opcode Fuzzy Hash: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                                        • Instruction Fuzzy Hash: 0DA1B131B01225AFDF219F61EC41AAF7BB6AF94340FA4402FF81196251DF3D8891CB58
                                                        APIs
                                                        • LoadIconW.USER32(?,00000063), ref: 004545DA
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004545EC
                                                        • SetWindowTextW.USER32(?,?), ref: 00454606
                                                        • GetDlgItem.USER32(?,000003EA), ref: 0045461F
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00454626
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00454637
                                                        • SetWindowTextW.USER32(00000000,?), ref: 0045463E
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00454663
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 0045467D
                                                        • GetWindowRect.USER32(?,?), ref: 00454688
                                                        • SetWindowTextW.USER32(?,?), ref: 004546FD
                                                        • GetDesktopWindow.USER32 ref: 00454708
                                                        • GetWindowRect.USER32(00000000), ref: 0045470F
                                                        • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 00454760
                                                        • GetClientRect.USER32(?,?), ref: 0045476F
                                                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 0045479E
                                                        • SetTimer.USER32(?,0000040A,?,00000000), ref: 004547E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                        • String ID:
                                                        • API String ID: 3869813825-0
                                                        • Opcode ID: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                                        • Instruction ID: 4e77de65cc6986e78e6be143d0a4b9e7f39e78804b6f4fc71fe9e35dfcfd5046
                                                        • Opcode Fuzzy Hash: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                                        • Instruction Fuzzy Hash: 8C616D71604701AFD320DF68CD88F2BB7E8AB88709F004E1DF98697691D7B8E849CB55
                                                        APIs
                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00458D2D
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00458D3A
                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00458D47
                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00458D54
                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00458D61
                                                        • LoadCursorW.USER32(00000000,00007F81), ref: 00458D6E
                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00458D7B
                                                        • LoadCursorW.USER32(00000000,00007F80), ref: 00458D88
                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00458D95
                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00458DA2
                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00458DAF
                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00458DBC
                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00458DC9
                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00458DD6
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00458DE3
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00458DF0
                                                        • GetCursorInfo.USER32 ref: 00458E03
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Cursor$Load$Info
                                                        • String ID:
                                                        • API String ID: 2577412497-0
                                                        • Opcode ID: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                                        • Instruction ID: 36b4ee280ed0253346847529aeb00c95e660e1b7f2a6688567eec4957a26740b
                                                        • Opcode Fuzzy Hash: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                                        • Instruction Fuzzy Hash: D9311671E4C3156AE7509F758C5AB1BBEE0AF40B54F004D2FF2889F2D1DAB9E4448B86
                                                        APIs
                                                        • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 004696CC
                                                        • GetFocus.USER32 ref: 004696E0
                                                        • GetDlgCtrlID.USER32(00000000), ref: 004696EB
                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046973F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$CtrlFocus
                                                        • String ID: 0
                                                        • API String ID: 1534620443-4108050209
                                                        • Opcode ID: 3dab727c688772619e9efc5d23afb6fcae73775eddc560d175f3e695e52b8611
                                                        • Instruction ID: 7d80af5808d25915b866e76daf530f36ef8b085de22dc1c7fc8dbb607ae8adb7
                                                        • Opcode Fuzzy Hash: 3dab727c688772619e9efc5d23afb6fcae73775eddc560d175f3e695e52b8611
                                                        • Instruction Fuzzy Hash: 1591E1B1604301ABD710DF14D884BABB7A8FB89714F004A1EF99497391E7B4DC49CBAB
                                                        APIs
                                                        • _memset.LIBCMT ref: 00468107
                                                        • GetMenuItemInfoW.USER32(?,00000007,00000000,?), ref: 00468190
                                                        • GetMenuItemCount.USER32(?), ref: 00468227
                                                        • DeleteMenu.USER32(?,00000005,00000000), ref: 004682B8
                                                        • DeleteMenu.USER32(?,00000004,00000000), ref: 004682C1
                                                        • DeleteMenu.USER32(?,00000006,00000000,?,00000004,00000000), ref: 004682CA
                                                        • DeleteMenu.USER32(00000000,00000003,00000000,?,00000006,00000000,?,00000004,00000000), ref: 004682D3
                                                        • GetMenuItemCount.USER32 ref: 004682DC
                                                        • SetMenuItemInfoW.USER32 ref: 00468317
                                                        • GetCursorPos.USER32(00000000), ref: 00468322
                                                        • SetForegroundWindow.USER32(?), ref: 0046832D
                                                        • TrackPopupMenuEx.USER32(?,00000000,00000000,00000006,?,00000000,?,?,00000006,00000000,?,00000004,00000000), ref: 00468345
                                                        • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468352
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                        • String ID: 0
                                                        • API String ID: 3993528054-4108050209
                                                        • Opcode ID: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                                                        • Instruction ID: a450cccb4b36e122d1eca3afa35c85d1e57e2007e4dd5bc50ce81cada7f4397f
                                                        • Opcode Fuzzy Hash: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                                                        • Instruction Fuzzy Hash: 3C71C070648301ABE3309B14CC49F5BB7E8BF86724F244B0EF5A5563D1DBB9A8458B1B
                                                        APIs
                                                        • DragQueryPoint.SHELL32(?,?), ref: 0046F2DA
                                                          • Part of subcall function 00441CB4: ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                                          • Part of subcall function 00441CB4: GetWindowRect.USER32(?,?), ref: 00441D5A
                                                          • Part of subcall function 00441CB4: PtInRect.USER32(?,?,?), ref: 00441D6F
                                                        • SendMessageW.USER32(?), ref: 0046F34C
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0046F355
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0046F37F
                                                        • _wcscat.LIBCMT ref: 0046F3BC
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0046F3D1
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0046F3E3
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F3F1
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F40E
                                                        • DragFinish.SHELL32(?), ref: 0046F414
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0046F4FC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                        • API String ID: 4085615965-3440237614
                                                        • Opcode ID: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                                        • Instruction ID: d92027b63b9478c52a8b17f069484fb886a707b260a555cedefccfc898d4b85d
                                                        • Opcode Fuzzy Hash: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                                        • Instruction Fuzzy Hash: 596170716043009BD700EF54D885E5FB7A8FFC9714F104A2EF99097291D7B8A949CBAA
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll
                                                        • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                        • API String ID: 3832890014-4202584635
                                                        • Opcode ID: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                                        • Instruction ID: bf73cd225697d97a5a257e466bf5c8c79b4efa22739c650e03c6b1f9c6e9338c
                                                        • Opcode Fuzzy Hash: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                                        • Instruction Fuzzy Hash: 1D01616160562122FE11322A7C03BDF15898F5139AF14447BFC05F1282FF4DDA8692EE
                                                        APIs
                                                        • _memset.LIBCMT ref: 004669C4
                                                        • _wcsncpy.LIBCMT ref: 00466A21
                                                        • _wcsncpy.LIBCMT ref: 00466A4D
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • _wcstok.LIBCMT ref: 00466A90
                                                          • Part of subcall function 004142A3: __getptd.LIBCMT ref: 004142A9
                                                        • _wcstok.LIBCMT ref: 00466B3F
                                                        • _wcscpy.LIBCMT ref: 00466BC8
                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00466CFE
                                                        • _wcslen.LIBCMT ref: 00466D1D
                                                        • _memset.LIBCMT ref: 00466BEE
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • _wcslen.LIBCMT ref: 00466D4B
                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00466D9E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$FileName_memset_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                        • String ID: X$HH
                                                        • API String ID: 3021350936-1944015008
                                                        • Opcode ID: b06cb37d3db4ad53d3a41f94d3d7a052046d00add24c9c6de48b5fd017d77e84
                                                        • Instruction ID: 73e83d7ea4d12cbe09e247b0b8120e99e9ae8af51722f6ce2f45a1bbad6557a4
                                                        • Opcode Fuzzy Hash: b06cb37d3db4ad53d3a41f94d3d7a052046d00add24c9c6de48b5fd017d77e84
                                                        • Instruction Fuzzy Hash: D1C1B2715043408BC714EF65C981A9FB3E4BF84304F15892FF949AB292EB78E905CB9B
                                                        APIs
                                                        • _memset.LIBCMT ref: 0045F4AE
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F519
                                                        • SetMenuItemInfoW.USER32(00000008,00000004,00000000,?), ref: 0045F556
                                                        • Sleep.KERNEL32(000001F4,?,?,00000000,?), ref: 0045F568
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu$Sleep_memset
                                                        • String ID: 0
                                                        • API String ID: 1504565804-4108050209
                                                        • Opcode ID: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                                                        • Instruction ID: 9e8996cb251b45e9fd8013479734a73363ce4640cf951279a7d2fdadd0934edb
                                                        • Opcode Fuzzy Hash: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                                                        • Instruction Fuzzy Hash: E171E3711043406BD3109F54DD48FABBBE8EBD5306F04086FFD8587252D6B9A94EC76A
                                                        APIs
                                                        • DestroyWindow.USER32(?,004A83D8,?), ref: 00455800
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 00455847
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateDestroy
                                                        • String ID: ,$tooltips_class32
                                                        • API String ID: 1109047481-3856767331
                                                        • Opcode ID: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                                        • Instruction ID: af4df8b80438f92fd5356fe82daba85812243c44dff517d7eb602cf52e2cfce3
                                                        • Opcode Fuzzy Hash: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                                        • Instruction Fuzzy Hash: BF719075244704AFE320DB28CC85F7B77E4EB89700F50491EFA8197391E6B5E905CB59
                                                        APIs
                                                        • _wcsncpy.LIBCMT ref: 0045CCFA
                                                        • __wsplitpath.LIBCMT ref: 0045CD3C
                                                        • _wcscat.LIBCMT ref: 0045CD51
                                                        • _wcscat.LIBCMT ref: 0045CD63
                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,00000104,?), ref: 0045CD78
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,00000104,?), ref: 0045CD8C
                                                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                        • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDD0
                                                        • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDE6
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDF8
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0045CE08
                                                        • _wcscpy.LIBCMT ref: 0045CE14
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CE5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                        • String ID: *.*
                                                        • API String ID: 1153243558-438819550
                                                        • Opcode ID: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                                        • Instruction ID: 4b7f18f3392d5c51d0b0bcfc25b88d1348604f1c1aa494fd035d881d108a9fe9
                                                        • Opcode Fuzzy Hash: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                                        • Instruction Fuzzy Hash: 0561E5B61043419FD731EF54C885AEBB7E4EB84305F44882FED8983242D67D998E879E
                                                        APIs
                                                        • _memset.LIBCMT ref: 00455127
                                                        • GetMenuItemInfoW.USER32 ref: 00455146
                                                        • DeleteMenu.USER32(?,?,00000000), ref: 004551B2
                                                        • DeleteMenu.USER32(?,?,00000000), ref: 004551C8
                                                        • GetMenuItemCount.USER32(?), ref: 004551D9
                                                        • SetMenu.USER32(?,00000000), ref: 004551E7
                                                        • DestroyMenu.USER32(?,?,00000000), ref: 004551F4
                                                        • DrawMenuBar.USER32 ref: 00455207
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow_memset
                                                        • String ID: 0
                                                        • API String ID: 1663942905-4108050209
                                                        • Opcode ID: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                                        • Instruction ID: b4bdd7d0bd4ee66815c45afb4cba49e6688c1fb7c5fb2b704b87d0eb3faa17d4
                                                        • Opcode Fuzzy Hash: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                                        • Instruction Fuzzy Hash: F4413B70600A01AFD715DF24D9A8B6B77A8BF44302F40891DFD49CB292DB78EC44CBA9
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __get_daylight__invoke_watson$__gmtime64_s$__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1481289235-0
                                                        • Opcode ID: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                                        • Instruction ID: 11750150b5911b8a2d77b888e51b7102539fbc40f42687a9f62e69b5342e6946
                                                        • Opcode Fuzzy Hash: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                                        • Instruction Fuzzy Hash: 8461B372B00B15DBD724AB69DC81AEB73E99F84324F14452FF011D7682EB78DA808B58
                                                        APIs
                                                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 0046FB61
                                                        • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 0046FB7A
                                                        • SendMessageW.USER32 ref: 0046FBAF
                                                        • SendMessageW.USER32 ref: 0046FBE2
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001), ref: 0046FC1B
                                                        • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0046FC3E
                                                        • ImageList_Create.COMCTL32(00000020,00000020,00000021,?,00000001), ref: 0046FC51
                                                        • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 0046FC73
                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FC97
                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FCA5
                                                        • SendMessageW.USER32 ref: 0046FD00
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$IconImageList_$CreateExtractReplace
                                                        • String ID:
                                                        • API String ID: 2632138820-0
                                                        • Opcode ID: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                                        • Instruction ID: f8b2170a3f6480226351c2682443129a31dd3945ebd2779c8b18a40e734619f9
                                                        • Opcode Fuzzy Hash: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                                        • Instruction Fuzzy Hash: A461BF70208305AFD320DF14DC85F5BB7E4FB89B14F10492EFA85972D1E7B4A8498B66
                                                        APIs
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00433BC7
                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00433BDE
                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00433BF5
                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00433C0C
                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00433C23
                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00433C3A
                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00433C51
                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00433C68
                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00433C7F
                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00433C96
                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00433CAD
                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00433CC4
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00433CDB
                                                        • LoadCursorW.USER32(00000000,00000000), ref: 00433CEF
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00433D06
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CursorLoad
                                                        • String ID:
                                                        • API String ID: 3238433803-0
                                                        • Opcode ID: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                                        • Instruction ID: acd63d7325575073817552101614e6badc0a76bef24473f745c9da0ba21645f6
                                                        • Opcode Fuzzy Hash: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                                        • Instruction Fuzzy Hash: 6D310E3058C302FFE7504F50EE0AB1C36A0BB48B47F008C7DF64AA62E0E6F055009B9A
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00460AF5
                                                        • _wcslen.LIBCMT ref: 00460B00
                                                        • __swprintf.LIBCMT ref: 00460B9E
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00460C11
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00460C8E
                                                        • GetDlgCtrlID.USER32(?), ref: 00460CE6
                                                        • GetWindowRect.USER32(?,?), ref: 00460D21
                                                        • GetParent.USER32(?), ref: 00460D40
                                                        • ScreenToClient.USER32(00000000), ref: 00460D47
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00460DBE
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00460DFB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                                        • String ID: %s%u
                                                        • API String ID: 1899580136-679674701
                                                        • Opcode ID: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                                        • Instruction ID: ed0b46c26cbb3f928a943cd91895a09858176ee0e89b0f6962e21683ef9d2041
                                                        • Opcode Fuzzy Hash: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                                        • Instruction Fuzzy Hash: 3AA1CD722043019BDB14DF54C884BEB73A8FF84714F04892EFD889B245E778E946CBA6
                                                        APIs
                                                        • CoTaskMemFree.OLE32(?), ref: 0047D6D3
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • StringFromCLSID.OLE32(?,?), ref: 0047D6B5
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • StringFromIID.OLE32(?,?), ref: 0047D7F0
                                                        • CoTaskMemFree.OLE32(?), ref: 0047D80A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: FreeFromStringTask_wcslen$_wcscpy
                                                        • String ID: 0vH$CLSID\$Interface\$ProgID$ToolBoxBitmap32$inprocserver32$localserver32$HH
                                                        • API String ID: 2485709727-934586222
                                                        • Opcode ID: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                                        • Instruction ID: 9b1d76abf7044590dd80f2c514dab21f357569e7696d0ed80310904c07b122bf
                                                        • Opcode Fuzzy Hash: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                                        • Instruction Fuzzy Hash: 63714BB5614201AFC304EF25C981D5BB3F8BF88704F108A2EF5599B351DB78E905CB6A
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$Folder_memset$BrowseDesktopFromInitializeListMallocPathUninitialize
                                                        • String ID: HH
                                                        • API String ID: 3381189665-2761332787
                                                        • Opcode ID: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                                        • Instruction ID: 9856a5a3be2a6f4b6f15ab218c20ab076772672eb14c4daba281b2e598c2a196
                                                        • Opcode Fuzzy Hash: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                                        • Instruction Fuzzy Hash: E1619AB59043009FC320EF65C88499BB7E9BFC8704F048E1EF98987252D775E849CB6A
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00434585
                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00434590
                                                        • CreateCompatibleDC.GDI32(00000000), ref: 0043459B
                                                        • SelectObject.GDI32(00000000,?), ref: 004345A9
                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00434618
                                                        • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00434665
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                        • String ID: (
                                                        • API String ID: 3300687185-3887548279
                                                        • Opcode ID: f1a61bd92dc1e5bf4a907c179000b9c6a14a2e3466c3eeb116f883cf8bb2fa69
                                                        • Instruction ID: a007e7ec8c3f390601fcb6226b5fc218b62818acb39bbc9fe8cd9ddeb27b86ed
                                                        • Opcode Fuzzy Hash: f1a61bd92dc1e5bf4a907c179000b9c6a14a2e3466c3eeb116f883cf8bb2fa69
                                                        • Instruction Fuzzy Hash: E4514871508345AFD310CF69C884B6BBBE9EF8A310F14881DFA9687390D7B5E844CB66
                                                        APIs
                                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E463
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E480
                                                        • __swprintf.LIBCMT ref: 0045E4D9
                                                        • _printf.LIBCMT ref: 0045E595
                                                        • _printf.LIBCMT ref: 0045E5B7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: LoadString_printf$__swprintf_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR $HH
                                                        • API String ID: 3590180749-2894483878
                                                        • Opcode ID: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                                        • Instruction ID: 42a5c2f6345f2e10047da6565a111f96cfad8617a22bea28fc44504b1d19b7ce
                                                        • Opcode Fuzzy Hash: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                                        • Instruction Fuzzy Hash: 9F51A171518345ABD324EF91CC41DAF77A8AF84754F04093FF94463292EB78EE488B6A
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0046F911
                                                        • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 0046F929
                                                        • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 0046F942
                                                        • DeleteObject.GDI32(?), ref: 0046F950
                                                        • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,00000000,00000000,00000000,00002010,?,000000F0), ref: 0046F95E
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9A8
                                                        • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 0046F9C1
                                                        • DeleteObject.GDI32(?), ref: 0046F9CF
                                                        • DestroyIcon.USER32(?,?,000000F7,00000001,00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9DD
                                                        • ExtractIconExW.SHELL32(?,?,?,000000FF,00000001), ref: 0046FA1D
                                                        • DestroyIcon.USER32(?), ref: 0046FA4F
                                                        • SendMessageW.USER32(?,000000F7,00000001,?), ref: 0046FA5A
                                                        • DeleteObject.GDI32(?), ref: 0046FA68
                                                        • DestroyIcon.USER32(?,?,000000F7,00000001,?), ref: 0046FA76
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Icon$Destroy$DeleteMessageObjectSend$ImageLoad$ExtractLongWindow
                                                        • String ID:
                                                        • API String ID: 3412594756-0
                                                        • Opcode ID: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                                        • Instruction ID: 2b127e2e725f503062080ad48664a75956f0b49bd2ac624c91da1236fc619d99
                                                        • Opcode Fuzzy Hash: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                                        • Instruction Fuzzy Hash: BD41B575344301ABE7209B65ED45B6B7398EB44711F00083EFA85A7381DBB9E809C76A
                                                        APIs
                                                          • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
                                                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                        • GetDriveTypeW.KERNEL32 ref: 0045DA30
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DA76
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DAAB
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DADF
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: SendString$_wcslen$BuffCharDriveLowerType
                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                        • API String ID: 4013263488-4113822522
                                                        • Opcode ID: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                                        • Instruction ID: 78e8968fe3d68f28a61334a0544e46eb3ade7c09d07056eb4a028b8014bab4f9
                                                        • Opcode Fuzzy Hash: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                                        • Instruction Fuzzy Hash: 86516E71604300ABD710EF55CC85F5EB3E4AF88714F14496EF985AB2D2D7B8E908CB5A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$_wcsncpy$LocalTime__wcstoi64
                                                        • String ID:
                                                        • API String ID: 228034949-0
                                                        • Opcode ID: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                                        • Instruction ID: c9113392db11e6d0b84b7dcaf0f9983ae7bcdcfbf3325debe08446cd55f13bc3
                                                        • Opcode Fuzzy Hash: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                                        • Instruction Fuzzy Hash: 874194B181435066DA10FF6AC8479DFB3A8EF89314F84495FF945D3162E378E64883AA
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,?,0046FAD5), ref: 004334F4
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043350F
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043351A
                                                        • GlobalLock.KERNEL32(00000000), ref: 00433523
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433533
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0043353A
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433541
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043354F
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,?), ref: 00433568
                                                        • GlobalFree.KERNEL32(00000000), ref: 0043357B
                                                        • GetObjectW.GDI32(?,00000018,?), ref: 004335A6
                                                        • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004335DB
                                                        • DeleteObject.GDI32(?), ref: 00433603
                                                        • SendMessageW.USER32(?,00000172,00000000,?), ref: 0043361B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3969911579-0
                                                        • Opcode ID: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                                        • Instruction ID: 5aed18668fdc988692497ed4484016cc97142e8c7c748bcd34b77a3330007e11
                                                        • Opcode Fuzzy Hash: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                                        • Instruction Fuzzy Hash: 70410471204210AFD710DF64DC88F6BBBE8FB89711F10492DFA45972A0D7B5A941CBAA
                                                        APIs
                                                        • GetParent.USER32 ref: 00445A8D
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00445AA0
                                                        • __wcsicoll.LIBCMT ref: 00445AC4
                                                        • __wcsicoll.LIBCMT ref: 00445AE0
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445B3D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll$ClassMessageNameParentSend
                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 3125838495-3381328864
                                                        • Opcode ID: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                                        • Instruction ID: 9ea7b4bfd8e333fc3d4c3d1cc69785ca983c3453aa66f955cff8de8c622a02b1
                                                        • Opcode Fuzzy Hash: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                                        • Instruction Fuzzy Hash: F011E9B1B40301BBFF10B6659C46EAF739CDF94759F00081BFD44E6182F6ACA9458769
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CopyVariant$ErrorLast
                                                        • String ID: Conversion of parameters failed$NULL Pointer assignment$Not an Object type
                                                        • API String ID: 2286883814-4206948668
                                                        • Opcode ID: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                                                        • Instruction ID: 5c76bcf0434180a49ef26f8382d3619d889c8a8ee3f63882ad125ac36acecb62
                                                        • Opcode Fuzzy Hash: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                                                        • Instruction Fuzzy Hash: 4EA1F0B1644300ABD620EB25CC81EABB3E9FBC4704F10891EF65987251D779E945CBAA
                                                        APIs
                                                          • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
                                                          • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                        • GetDriveTypeW.KERNEL32(?,?,00000061), ref: 00475EEC
                                                        • _wcscpy.LIBCMT ref: 00475F18
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                        • String ID: a$all$cdrom$fixed$network$ramdisk$removable$unknown$HH
                                                        • API String ID: 3052893215-4176887700
                                                        • Opcode ID: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                                        • Instruction ID: 30c0e749cffa51fc832ec364bb88d57898ea161693411a08ebb212f54f1b1ce2
                                                        • Opcode Fuzzy Hash: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                                        • Instruction Fuzzy Hash: E951E5716047009BC710EF51D981B9BB3D4AB85705F108C2FF948AB382D7B9DE09879B
                                                        APIs
                                                        • StringFromIID.OLE32(?,?,00000003,?,?,00000000), ref: 004582E5
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • CoTaskMemFree.OLE32(?,00000000), ref: 00458335
                                                        • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 00458351
                                                        • RegQueryValueExW.ADVAPI32 ref: 00458381
                                                        • CLSIDFromString.OLE32(00000000,?), ref: 004583AF
                                                        • RegQueryValueExW.ADVAPI32 ref: 004583E8
                                                        • LoadRegTypeLib.OLEAUT32(?,?), ref: 00458486
                                                          • Part of subcall function 00413F97: __wtof_l.LIBCMT ref: 00413FA1
                                                        • RegCloseKey.ADVAPI32(?), ref: 004584BA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: FromQueryStringValue_wcslen$CloseFreeLoadOpenTaskType__wtof_l_wcscpy
                                                        • String ID: Version$\TypeLib$interface\
                                                        • API String ID: 656856066-939221531
                                                        • Opcode ID: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                                        • Instruction ID: 73379605cfaaf105ee685c6daddaf2c4824f5dc828714578f474d0d05c7db838
                                                        • Opcode Fuzzy Hash: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                                        • Instruction Fuzzy Hash: 19513B715083059BD310EF55D944A6FB3E8FFC8B08F004A2DF985A7251EA78DD09CB9A
                                                        APIs
                                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E676
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E69A
                                                        • __swprintf.LIBCMT ref: 0045E6EE
                                                        • _printf.LIBCMT ref: 0045E7A9
                                                        • _printf.LIBCMT ref: 0045E7D2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: LoadString_printf$__swprintf_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 3590180749-2354261254
                                                        • Opcode ID: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                                        • Instruction ID: 835382aeb01427732dc6b750cf2ba574ed77461063debdd42288bdc21f9728b4
                                                        • Opcode Fuzzy Hash: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                                        • Instruction Fuzzy Hash: B051D5715143019BD324FB51CC41EAF77A8AF84354F14093FF94563292DB78AE49CB6A
                                                        APIs
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • _memset.LIBCMT ref: 00458194
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004581D6
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,00000000), ref: 004581F4
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,00000000), ref: 00458219
                                                        • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,?), ref: 00458248
                                                        • CLSIDFromString.OLE32(00000000,?), ref: 00458279
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0045828F
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00458296
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset_wcslen
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 2255324689-22481851
                                                        • Opcode ID: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                                        • Instruction ID: 0916ae95de1959dc40878de41837780f7e862baf069d4d5c3429810960799c2e
                                                        • Opcode Fuzzy Hash: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                                        • Instruction Fuzzy Hash: 4A4190725083019BD320EF54C845B5FB7E8AF84714F044D2EFA8577291DBB8E949CB9A
                                                        APIs
                                                        • RegOpenKeyExW.ADVAPI32(80000000,interface,00000000,00020019,?), ref: 00458513
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00458538
                                                        • RegCloseKey.ADVAPI32(?), ref: 00458615
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,000001FE,interface\), ref: 0045858A
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,00000028), ref: 004585A8
                                                        • __wcsicoll.LIBCMT ref: 004585D6
                                                        • IIDFromString.OLE32(?,?,?,?), ref: 004585EB
                                                        • RegCloseKey.ADVAPI32(?), ref: 004585F8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CloseOpen$EnumFromQueryStringValue__wcsicoll_wcslen
                                                        • String ID: ($interface$interface\
                                                        • API String ID: 2231185022-3327702407
                                                        • Opcode ID: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                                        • Instruction ID: 2ed788c9a442d2de66cb2a0eaf665167c450c6ff9570aaff4df7cfaf3afbbce1
                                                        • Opcode Fuzzy Hash: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                                        • Instruction Fuzzy Hash: CE317271204305ABE710DF54DD85F6BB3E8FB84744F10492DF685A6191EAB8E908C76A
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?), ref: 004365A5
                                                        • gethostname.WSOCK32(00000100,00000100,00000101,?), ref: 004365BC
                                                        • gethostbyname.WSOCK32(00000101,00000100,00000100,00000101,?), ref: 004365C6
                                                        • _wcscpy.LIBCMT ref: 004365F5
                                                        • WSACleanup.WSOCK32 ref: 004365FD
                                                        • inet_ntoa.WSOCK32(00000100,?), ref: 00436624
                                                        • _strcat.LIBCMT ref: 0043662F
                                                        • _wcscpy.LIBCMT ref: 00436644
                                                        • WSACleanup.WSOCK32(?,?,?,?,?,?,00000100,?), ref: 00436652
                                                        • _wcscpy.LIBCMT ref: 00436666
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$Cleanup$Startup_strcatgethostbynamegethostnameinet_ntoa
                                                        • String ID: 0.0.0.0
                                                        • API String ID: 2691793716-3771769585
                                                        • Opcode ID: 72edaa20f59d4c855ae2a4057bf2e912041bb0bcae33cfe0ba1e7234a9852c49
                                                        • Instruction ID: 29d249c793a1599df1911ffab6ed89036a29d54f41df1114d8fa63e2d2305339
                                                        • Opcode Fuzzy Hash: 72edaa20f59d4c855ae2a4057bf2e912041bb0bcae33cfe0ba1e7234a9852c49
                                                        • Instruction Fuzzy Hash: 5C21D4726003016BD620FB269C42FFF33A89FD4318F54492FF64456242EABDD58983AB
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048C968,0000000C,00416C4D,00000000,00000000,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B24
                                                        • __crt_waiting_on_module_handle.LIBCMT ref: 00416B2F
                                                          • Part of subcall function 0041177F: Sleep.KERNEL32(000003E8,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 0041178B
                                                          • Part of subcall function 0041177F: GetModuleHandleW.KERNEL32(00411739,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00411794
                                                        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00416B58
                                                        • GetProcAddress.KERNEL32(00411739,DecodePointer), ref: 00416B68
                                                        • __lock.LIBCMT ref: 00416B8A
                                                        • InterlockedIncrement.KERNEL32(00EA60FF), ref: 00416B97
                                                        • __lock.LIBCMT ref: 00416BAB
                                                        • ___addlocaleref.LIBCMT ref: 00416BC9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                        • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                        • API String ID: 1028249917-2843748187
                                                        • Opcode ID: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                                        • Instruction ID: dfb830706c011728ae11a8c0f52cb2fa371409e71f4acd403326aacb15a29bdd
                                                        • Opcode Fuzzy Hash: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                                        • Instruction Fuzzy Hash: 4E119671944701AFD720EF76C905B9EBBE0AF00714F10495FE469A6391DB78A580CB1D
                                                        APIs
                                                        • SendMessageW.USER32(?,00000000,000000FF,?), ref: 0044931D
                                                        • SendMessageW.USER32(?,0045BBB0,00000000,00000000), ref: 0044932D
                                                        • CharNextW.USER32(?,?,?,?,0045BBB0,00000000,00000000,?,?), ref: 00449361
                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449375
                                                        • SendMessageW.USER32(?,00000402,?), ref: 0044941C
                                                        • SendMessageW.USER32(004A83D8,000000C2,00000001,?), ref: 004494A0
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449515
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CharNext
                                                        • String ID:
                                                        • API String ID: 1350042424-0
                                                        • Opcode ID: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                                        • Instruction ID: cf19a455924c4199ae2d31ef2e344bdd2865620a2145bd440d1f5c61272ee54d
                                                        • Opcode Fuzzy Hash: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                                        • Instruction Fuzzy Hash: 5D81B5312083019BE720DF15DC85FBBB7E4EBD9B20F00492EFA54962C0D7B99946D766
                                                        APIs
                                                        • GetKeyboardState.USER32(?,?,00000000), ref: 00453C0D
                                                        • SetKeyboardState.USER32(?), ref: 00453C5A
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00453C82
                                                        • GetKeyState.USER32(000000A0), ref: 00453C99
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00453CC9
                                                        • GetKeyState.USER32(000000A1), ref: 00453CDA
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00453D07
                                                        • GetKeyState.USER32(00000011), ref: 00453D15
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00453D3F
                                                        • GetKeyState.USER32(00000012), ref: 00453D4D
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00453D77
                                                        • GetKeyState.USER32(0000005B), ref: 00453D85
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                                        • Instruction ID: 09d2c23b2f41f951af40c960ff4fa7a39ed3d74d48f5bb091813d5d41b5bf946
                                                        • Opcode Fuzzy Hash: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                                        • Instruction Fuzzy Hash: BD5108311497C42AF731EF6048217A7BBE45F52782F488D5EE9C107283E619AB0C976B
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 00437DD7
                                                        • GetWindowRect.USER32(00000000,?), ref: 00437DE9
                                                        • MoveWindow.USER32(00000000,0000000A,?,?,?,00000000), ref: 00437E5C
                                                        • GetDlgItem.USER32(?,00000002), ref: 00437E70
                                                        • GetWindowRect.USER32(00000000,?), ref: 00437E82
                                                        • MoveWindow.USER32(00000000,?,00000000,?,?,00000000), ref: 00437EDB
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00437EEA
                                                        • GetWindowRect.USER32(00000000,?), ref: 00437EFC
                                                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00437F46
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00437F55
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 00437F6E
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00437F78
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                                        • Instruction ID: 6334a21bf5495bf578199e0a0c43900503e40640961724061e29feeedb49a886
                                                        • Opcode Fuzzy Hash: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                                        • Instruction Fuzzy Hash: 46511CB16083069FC318DF68DD85A2BB7E9ABC8300F144A2DF985D3391E6B4ED058B95
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                        • String ID:
                                                        • API String ID: 136442275-0
                                                        • Opcode ID: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                                        • Instruction ID: e47e2093bf76b35e8f1fec89578fc46911e8a4506192668d3a16ce6d5165f020
                                                        • Opcode Fuzzy Hash: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                                        • Instruction Fuzzy Hash: 744124B2408345ABC235E754C885EEF73ECABD8314F44891EB68D42141EB796688C7A7
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B479
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ConnectRegistry_wcslen
                                                        • String ID: HH
                                                        • API String ID: 535477410-2761332787
                                                        • Opcode ID: e91c6bd909ad74ed1928ed0244ed8aa8a8dc52ba60fb0b240039b69f8a910896
                                                        • Instruction ID: 7a368be733395892e28f24b11b3b05e85d853a2cd395d98498a1c99032eed9d9
                                                        • Opcode Fuzzy Hash: e91c6bd909ad74ed1928ed0244ed8aa8a8dc52ba60fb0b240039b69f8a910896
                                                        • Instruction Fuzzy Hash: 63E171B1604200ABC714EF28C981F1BB7E4EF88704F148A1EF685DB381D779E945CB9A
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 004604B5
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 004604F1
                                                        • _wcslen.LIBCMT ref: 00460502
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 00460510
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00460589
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 004605C2
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00460606
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 0046063E
                                                        • GetWindowRect.USER32(?,?), ref: 004606AD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen
                                                        • String ID: ThumbnailClass
                                                        • API String ID: 4123061591-1241985126
                                                        • Opcode ID: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                                        • Instruction ID: b645ef8d54a60b7d8a856e9fdf4d8999e4c56e3b903fe9b51be5921097eabf2a
                                                        • Opcode Fuzzy Hash: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                                        • Instruction Fuzzy Hash: 3F91B0715043019FDB14DF24C884BAB77A8EF84715F04896FFD85AA281E778E905CBAB
                                                        APIs
                                                          • Part of subcall function 00456354: GetCursorPos.USER32(004A83D8), ref: 0045636A
                                                          • Part of subcall function 00456354: ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                                          • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563D0
                                                          • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563DC
                                                        • DefDlgProcW.USER32(?,00000205,?,?,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F55F
                                                        • ImageList_DragLeave.COMCTL32(00000000,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F57D
                                                        • ImageList_EndDrag.COMCTL32 ref: 0046F583
                                                        • ReleaseCapture.USER32 ref: 0046F589
                                                        • SetWindowTextW.USER32(?,00000000), ref: 0046F620
                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0046F630
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID$HH
                                                        • API String ID: 2483343779-2060113733
                                                        • Opcode ID: b963958ab96ed52e1c3ab3b45c628991f908dc465e455618a5f6fc8545d443fb
                                                        • Instruction ID: 4b94e37398fb4c0e8bf176de98e3888209b69965db7f8e5b86c8cb252d1f017b
                                                        • Opcode Fuzzy Hash: b963958ab96ed52e1c3ab3b45c628991f908dc465e455618a5f6fc8545d443fb
                                                        • Instruction Fuzzy Hash: EB5106716043119BD700DF18DC85FAF77A5EB89310F04492EF941973A2DB789D49CBAA
                                                        APIs
                                                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 0046FD8A
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,004A83D8,?), ref: 0046FDF0
                                                        • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 0046FE0E
                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,004A83D8,?), ref: 0046FE20
                                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 0046FEA5
                                                        • SendMessageW.USER32(?,0000113F,00000000,?), ref: 0046FEDF
                                                        • GetClientRect.USER32(?,?), ref: 0046FEF2
                                                        • RedrawWindow.USER32(?,?,00000000,00000000), ref: 0046FF02
                                                        • DestroyIcon.USER32(?), ref: 0046FFCC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                        • String ID: 2
                                                        • API String ID: 1331449709-450215437
                                                        • Opcode ID: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                                        • Instruction ID: e79942d1a0196d9b5e30c5c178d8ccafd59c9ae1e7fac48b8759c586c5a3b44e
                                                        • Opcode Fuzzy Hash: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                                        • Instruction Fuzzy Hash: EB51AC702043019FD320CF44D885BAABBE5FB88700F04487EE684872A2D7B5A849CB5A
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439409
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 0043940C
                                                        • GetCurrentProcess.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?), ref: 0043941D
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 00439420
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeAssignPrimaryTokenPrivilege,?), ref: 0043945B
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeIncreaseQuotaPrivilege,?), ref: 00439474
                                                        • _memcmp.LIBCMT ref: 004394A9
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004394F8
                                                        Strings
                                                        • SeIncreaseQuotaPrivilege, xrefs: 0043946A
                                                        • SeAssignPrimaryTokenPrivilege, xrefs: 00439455
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread_memcmp
                                                        • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
                                                        • API String ID: 1446985595-805462909
                                                        • Opcode ID: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                                        • Instruction ID: 628aaead06b6f58e004e5b45c2ed9710a22b4d2b921ab75b424857e8fd72c9d6
                                                        • Opcode Fuzzy Hash: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                                        • Instruction Fuzzy Hash: DB31A371508312ABC710DF21CD41AAFB7E8FB99704F04591EF98193240E7B8DD4ACBAA
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D848
                                                        • GetDriveTypeW.KERNEL32(?,?), ref: 0045D8A3
                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D94A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$HH
                                                        • API String ID: 2907320926-41864084
                                                        • Opcode ID: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                                        • Instruction ID: d4cab332979e247f8c2da9788294718902473fa09eb5ff996f03d25688ce9cbb
                                                        • Opcode Fuzzy Hash: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                                        • Instruction Fuzzy Hash: C7318B75A083008FC310EF65E48481EB7A1AFC8315F648D2FF945A7362C779D9068BAB
                                                        APIs
                                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 004672E6
                                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046735D
                                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467375
                                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004673ED
                                                        • SafeArrayGetVartype.OLEAUT32(CE8B7824,?), ref: 00467418
                                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467445
                                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046746A
                                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 00467559
                                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 0046748A
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467571
                                                        • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004675E4
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Data$AccessUnaccess$Exception@8ThrowVartype_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID:
                                                        • API String ID: 1932665248-0
                                                        • Opcode ID: 16f99e80be173eecdd1bb573f6b7f825babaa5351af7cc3efc94bb11c862a2f8
                                                        • Instruction ID: 42a0e90c8bf2b482c85e144861ec280134e9fb1dbd9e00a0d693b148f8e5f150
                                                        • Opcode Fuzzy Hash: 16f99e80be173eecdd1bb573f6b7f825babaa5351af7cc3efc94bb11c862a2f8
                                                        • Instruction Fuzzy Hash: E8B1BF752082009FD304DF29C884B6B77E5FF98318F14496EE98587362E779E885CB6B
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00448182
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00448185
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004481A7
                                                        • _memset.LIBCMT ref: 004481BA
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481CC
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0044824E
                                                        • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482A4
                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482BE
                                                        • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482E3
                                                        • SendMessageW.USER32(?,0000101E,00000001,00000000), ref: 004482FC
                                                        • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448317
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow_memset
                                                        • String ID:
                                                        • API String ID: 830647256-0
                                                        • Opcode ID: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                                        • Instruction ID: 69fd08a602074ed3d664547bad3ac5a94a9e6c02d61aa1d07dc3907ec7ad0976
                                                        • Opcode Fuzzy Hash: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                                        • Instruction Fuzzy Hash: 41616F70208341AFE310DF54C881FABB7A4FF89704F14465EFA909B2D1DBB5A945CB56
                                                        APIs
                                                          • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                                        • DestroyAcceleratorTable.USER32(?), ref: 0046EA9F
                                                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB04
                                                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB18
                                                        • ImageList_Destroy.COMCTL32(?), ref: 0046EB24
                                                        • DeleteObject.GDI32(005C0000), ref: 0046EB4F
                                                        • DestroyIcon.USER32(00750050), ref: 0046EB67
                                                        • DeleteObject.GDI32(3FAD7DF8), ref: 0046EB7F
                                                        • DestroyWindow.USER32(00430049), ref: 0046EB97
                                                        • DestroyIcon.USER32(?), ref: 0046EBBF
                                                        • DestroyIcon.USER32(?), ref: 0046EBCD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateRectTableWindow
                                                        • String ID:
                                                        • API String ID: 802431696-0
                                                        • Opcode ID: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                                        • Instruction ID: 42d633cefbe7d7192e7a113645d0a532909e6831d49db23f2259be933aabe8c6
                                                        • Opcode Fuzzy Hash: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                                        • Instruction Fuzzy Hash: 17513178600202DFDB14DF26D894E2A77E9FB4AB14B54446EE502CB361EB38EC41CB5E
                                                        APIs
                                                        • GetKeyboardState.USER32(?,?,?), ref: 00444D8A
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00444E0F
                                                        • GetKeyState.USER32(000000A0), ref: 00444E26
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00444E40
                                                        • GetKeyState.USER32(000000A1), ref: 00444E51
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00444E69
                                                        • GetKeyState.USER32(00000011), ref: 00444E77
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00444E8F
                                                        • GetKeyState.USER32(00000012), ref: 00444E9D
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00444EB5
                                                        • GetKeyState.USER32(0000005B), ref: 00444EC3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                                        • Instruction ID: c605e69a62dfc64c618b97cb3a1930d242a0674024be490a091b983f03ece729
                                                        • Opcode Fuzzy Hash: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                                        • Instruction Fuzzy Hash: 6A41C3646087C52DFB31966484017E7FFD16FA2708F58844FD1C5067C2DBAEA9C8C7AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: HH
                                                        • API String ID: 0-2761332787
                                                        • Opcode ID: 31ff441d28c5e927918bd04bcaff178bc0424bc9c98581a0806166e4fd3f8403
                                                        • Instruction ID: 1932890218e454eaab518c2d08cf67ea4bcb6b95680f1d85a47b5a5cee1eebd3
                                                        • Opcode Fuzzy Hash: 31ff441d28c5e927918bd04bcaff178bc0424bc9c98581a0806166e4fd3f8403
                                                        • Instruction Fuzzy Hash: 99A1A1726043009BD710EF65DC82B6BB3E9ABD4718F008E2EF558E7281D779E9448B5A
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004508CB
                                                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 004508DB
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,00001036,00000000,?,000000FF,?,SysListView32,004848E8,00000000), ref: 004508FC
                                                        • _wcslen.LIBCMT ref: 00450944
                                                        • _wcscat.LIBCMT ref: 00450955
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045096C
                                                        • SendMessageW.USER32(?,00001061,?,?), ref: 0045099B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcscat_wcslen
                                                        • String ID: -----$SysListView32
                                                        • API String ID: 4008455318-3975388722
                                                        • Opcode ID: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                                        • Instruction ID: 786a3889ee88f98d9b0e9b4b0e1dacf7018a6923f31dd28eeaa3c07ad082d1a6
                                                        • Opcode Fuzzy Hash: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                                        • Instruction Fuzzy Hash: 17519470504340ABE330DB65C885FABB3E4AF84714F104E1EFA94972D3D6B99989CB65
                                                        APIs
                                                        • _memset.LIBCMT ref: 00448625
                                                        • CreateMenu.USER32 ref: 0044863C
                                                        • SetMenu.USER32(?,00000000), ref: 0044864C
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 004486D6
                                                        • IsMenu.USER32(?), ref: 004486EB
                                                        • CreatePopupMenu.USER32 ref: 004486F5
                                                        • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 00448739
                                                        • DrawMenuBar.USER32 ref: 00448742
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                        • String ID: 0
                                                        • API String ID: 176399719-4108050209
                                                        • Opcode ID: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                                        • Instruction ID: 98f94d81d6847d6484dd50bbdc77a0bd9f9f2d632c710d3394220f00cc789bef
                                                        • Opcode Fuzzy Hash: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                                        • Instruction Fuzzy Hash: 86417675604201AFD700CF68D894A9BBBE4FF89314F14891EFA488B350DBB5A845CFA6
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469277
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00469289
                                                        • GetParent.USER32 ref: 004692A4
                                                        • SendMessageW.USER32(00000000,?,00000111), ref: 004692A7
                                                        • GetDlgCtrlID.USER32(00000000), ref: 004692AE
                                                        • GetParent.USER32 ref: 004692C7
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 004692CA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 2040099840-1403004172
                                                        • Opcode ID: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                                        • Instruction ID: ef07326ddff4210f4741e87947fad3c2ec39ee11b6619cfdf8cc81125e1c6f8c
                                                        • Opcode Fuzzy Hash: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                                        • Instruction Fuzzy Hash: BC21D6716002147BD600AB65CC45DBFB39CEB85324F044A1FF954A73D1DAB8EC0947B9
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469471
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00469483
                                                        • GetParent.USER32 ref: 0046949E
                                                        • SendMessageW.USER32(00000000,?,00000111), ref: 004694A1
                                                        • GetDlgCtrlID.USER32(00000000), ref: 004694A8
                                                        • GetParent.USER32 ref: 004694C1
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 004694C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 2040099840-1403004172
                                                        • Opcode ID: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                                        • Instruction ID: 434b10a17d45167e777e8ea6e726dd6ee4e01267e4a119798c8aa60e835c5cdc
                                                        • Opcode Fuzzy Hash: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                                        • Instruction Fuzzy Hash: CA21D7756002147BD600BB29CC45EBFB39CEB85314F04492FF984A7291EABCEC0A4779
                                                        APIs
                                                          • Part of subcall function 004419ED: DeleteObject.GDI32(?), ref: 00441A53
                                                        • SendMessageW.USER32(76C223D0,00001001,00000000,00000000), ref: 00448E73
                                                        • SendMessageW.USER32(76C223D0,00001026,00000000,00000000), ref: 00448E7E
                                                          • Part of subcall function 00441A7A: CreateSolidBrush.GDI32 ref: 00441ACB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                        • String ID:
                                                        • API String ID: 3771399671-0
                                                        • Opcode ID: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                                        • Instruction ID: ebbecaf0548398ae771b9aa28ebf0b72f134f9ffbbfb28b2279bd799396bd9e3
                                                        • Opcode Fuzzy Hash: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                                        • Instruction Fuzzy Hash: F4510930208300AFE2209F25DD85F6F77EAEB85B14F14091EF994E72D0CBB9E9458769
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                        • String ID:
                                                        • API String ID: 3413494760-0
                                                        • Opcode ID: afb533e23b19910be0c027df8fa87fd227b592e7e5a0e6e969ae1a59b8da4157
                                                        • Instruction ID: 77b59fa0745152fd1b6386ccdd9ca850b9b7f4abb66e551d88b584249de3d357
                                                        • Opcode Fuzzy Hash: afb533e23b19910be0c027df8fa87fd227b592e7e5a0e6e969ae1a59b8da4157
                                                        • Instruction Fuzzy Hash: F83150B2600746AFC714DF7AC880996FBA8FF88310B44892EE64983641D735F554CBA5
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 004377D7
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,0045FDE0,?,?,00000001), ref: 004377EB
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 004377F8
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 00437809
                                                        • GetWindowThreadProcessId.USER32(?,00000001), ref: 00437819
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043782E
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043783D
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 0043788D
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378A1
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                                        • Instruction ID: cf5237ead9178137421241ba4763476990ac919c12b5de4495d1c20f4e3090f4
                                                        • Opcode Fuzzy Hash: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                                        • Instruction Fuzzy Hash: B0316FB1504341AFD768EF28DC88A7BB7A9EF9D310F14182EF44197250D7B89C44CB69
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll
                                                        • String ID: 0%d$DOWN$OFF
                                                        • API String ID: 3832890014-468733193
                                                        • Opcode ID: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                                        • Instruction ID: 3901981f80fa7430cd77b89167089bc3925961a07aad88d0cc2f25a35af8916b
                                                        • Opcode Fuzzy Hash: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                                        • Instruction Fuzzy Hash: B7F1D8614083856DEB21EB21C845BAF7BE85F95309F08092FF98212193D7BCD68DC76B
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000000), ref: 0045E959
                                                        • VariantCopy.OLEAUT32(00000000), ref: 0045E963
                                                        • VariantClear.OLEAUT32 ref: 0045E970
                                                        • VariantTimeToSystemTime.OLEAUT32 ref: 0045EAEB
                                                        • __swprintf.LIBCMT ref: 0045EB1F
                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 0045EB61
                                                        • VariantInit.OLEAUT32(00000000), ref: 0045EBE7
                                                        Strings
                                                        • %4d%02d%02d%02d%02d%02d, xrefs: 0045EB19
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Variant$InitTime$ClearCopyFromSystem__swprintf
                                                        • String ID: %4d%02d%02d%02d%02d%02d
                                                        • API String ID: 43541914-1568723262
                                                        • Opcode ID: 59f20d5c687eca5b8ac21bf224ed8e62dc0999386ac77495242af5446a13f09a
                                                        • Instruction ID: db8708ae94f177a13b26e6bf0e0b18ed2eb17208bc27bd00c320e315e6f9d40a
                                                        • Opcode Fuzzy Hash: 59f20d5c687eca5b8ac21bf224ed8e62dc0999386ac77495242af5446a13f09a
                                                        • Instruction Fuzzy Hash: ABC1F4BB1006019BC704AF06D480666F7A1FFD4322F14896FED984B341DB3AE95ED7A6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                        • API String ID: 0-1603158881
                                                        • Opcode ID: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                                        • Instruction ID: 1d39c91c6ba170ccd8bd44326015c92659356e06a413e753493f98454e3169a0
                                                        • Opcode Fuzzy Hash: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                                        • Instruction Fuzzy Hash: 49A1D3B14043459BCB20EF50CC81BDE37A4AF94348F44891FF9896B182EF79A64DC76A
                                                        APIs
                                                        • _memset.LIBCMT ref: 00479D1F
                                                        • VariantInit.OLEAUT32(?), ref: 00479F06
                                                        • VariantClear.OLEAUT32(?), ref: 00479F11
                                                        • VariantInit.OLEAUT32(?), ref: 00479DF7
                                                          • Part of subcall function 00467626: VariantInit.OLEAUT32(00000000), ref: 00467666
                                                          • Part of subcall function 00467626: VariantCopy.OLEAUT32(00000000,00479BD3), ref: 00467670
                                                          • Part of subcall function 00467626: VariantClear.OLEAUT32 ref: 0046767D
                                                        • VariantClear.OLEAUT32(?), ref: 00479F9C
                                                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Variant$Copy$ClearInit$ErrorLast_memset
                                                        • String ID: F$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                        • API String ID: 665237470-60002521
                                                        • Opcode ID: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                                                        • Instruction ID: 799f1794578ead7d01377608c22e1fb401aa4fc5ffca8a64c02b8280356d09a3
                                                        • Opcode Fuzzy Hash: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                                                        • Instruction Fuzzy Hash: 6091B272204341AFD720DF64D880EABB7E9EFC4314F50891EF28987291D7B9AD45C766
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D5A
                                                        • DestroyWindow.USER32(?), ref: 0042A751
                                                        • UnregisterHotKey.USER32(?), ref: 0042A778
                                                        • FreeLibrary.KERNEL32(?), ref: 0042A822
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0042A854
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                        • String ID: close all$Wu
                                                        • API String ID: 4174999648-1790509019
                                                        • Opcode ID: 9f9deb73285226e6ba240568d142da5fec9cf520cd27fc9a3a2cacaca98377aa
                                                        • Instruction ID: e23b5dd52123a376b0379481fe8be5d2f02d07e70979f80a1c72d587d5a24a2c
                                                        • Opcode Fuzzy Hash: 9f9deb73285226e6ba240568d142da5fec9cf520cd27fc9a3a2cacaca98377aa
                                                        • Instruction Fuzzy Hash: FFA17075A102248FCB20EF55CC85B9AB3B8BF44304F5044EEE90967291D779AE85CF9D
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046A84D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ConnectRegistry_wcslen
                                                        • String ID: HH
                                                        • API String ID: 535477410-2761332787
                                                        • Opcode ID: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                                        • Instruction ID: 68d8ff7817732ac0dd8275009c421e29eb5870de2046e22f9b94a35ba54c9d9f
                                                        • Opcode Fuzzy Hash: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                                        • Instruction Fuzzy Hash: FE617FB56083009FD304EF65C981F6BB7E4AF88704F14891EF681A7291D678ED09CB97
                                                        APIs
                                                        • _memset.LIBCMT ref: 0045F317
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F367
                                                        • IsMenu.USER32(?), ref: 0045F380
                                                        • CreatePopupMenu.USER32 ref: 0045F3C5
                                                        • GetMenuItemCount.USER32(?), ref: 0045F42F
                                                        • InsertMenuItemW.USER32(?,?,00000001,?), ref: 0045F45B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                        • String ID: 0$2
                                                        • API String ID: 3311875123-3793063076
                                                        • Opcode ID: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                                        • Instruction ID: 6c7ab59355789d00cbd42ef361c1bd9312a1bc9220e92816940967e3bd29aecc
                                                        • Opcode Fuzzy Hash: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                                        • Instruction Fuzzy Hash: E451CF702043409FD710CF69D888B6BBBE4AFA5319F104A3EFD9586292D378994DCB67
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,004A8E80,00000100,00000100,?,C:\Users\user\Desktop\0wxckB4Iba.exe), ref: 0043719E
                                                        • LoadStringW.USER32(00000000), ref: 004371A7
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004371BD
                                                        • LoadStringW.USER32(00000000), ref: 004371C0
                                                        • _printf.LIBCMT ref: 004371EC
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00437208
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 004371E7
                                                        • C:\Users\user\Desktop\0wxckB4Iba.exe, xrefs: 00437189
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_printf
                                                        • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\0wxckB4Iba.exe
                                                        • API String ID: 220974073-3618303959
                                                        • Opcode ID: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                                        • Instruction ID: cc9e6972dbc5209964c20f0f7d1f7455a13934f6c555fd98bc0bf92a0502fb90
                                                        • Opcode Fuzzy Hash: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                                        • Instruction Fuzzy Hash: F7014FB2A543447AE620EB549D06FFB365CABC4B01F444C1EB794A60C0AAF865548BBA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                                        • Instruction ID: 20732dcab93056f759d0b04a6df1a57780e33876730225f1fefd21ccf2a16f59
                                                        • Opcode Fuzzy Hash: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                                        • Instruction Fuzzy Hash: 36519070200301ABD320DF29CC85F5BB7E8EB48715F540A1EF995E7292D7B4E949CB29
                                                        APIs
                                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\0wxckB4Iba.exe,?,C:\Users\user\Desktop\0wxckB4Iba.exe,004A8E80,C:\Users\user\Desktop\0wxckB4Iba.exe,0040F3D2), ref: 0040FFCA
                                                          • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0045355E
                                                        • MoveFileW.KERNEL32(?,?), ref: 0045358E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                        • String ID:
                                                        • API String ID: 978794511-0
                                                        • Opcode ID: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                                        • Instruction ID: dcad70f49e32ae1adaf0c812d378eb0bba467e0a617048934f4a65f03e3a0b24
                                                        • Opcode Fuzzy Hash: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                                        • Instruction Fuzzy Hash: 665162B25043406AC724EF61D885ADFB3E8AFC8305F44992EB94992151E73DD34DC767
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                                        • Instruction ID: b1e2397247e50d0c7000acf5a2db8631a214b417b603bec0598d849dd48054e0
                                                        • Opcode Fuzzy Hash: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                                        • Instruction Fuzzy Hash: E54128332402806BE320A75DB8C4ABBFB98E7A2362F50443FF18196520D76678C5D339
                                                        APIs
                                                          • Part of subcall function 0044593E: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 0044595D
                                                          • Part of subcall function 0044593E: GetCurrentThreadId.KERNEL32 ref: 00445964
                                                          • Part of subcall function 0044593E: AttachThreadInput.USER32(00000000,?,00000001,00478FA7), ref: 0044596B
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D15
                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00445D35
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445D3F
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D45
                                                        • PostMessageW.USER32(00000000,00000100,00000027,00000000), ref: 00445D66
                                                        • Sleep.KERNEL32(00000000), ref: 00445D70
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D76
                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00445D8B
                                                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445D8F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                        • String ID:
                                                        • API String ID: 2014098862-0
                                                        • Opcode ID: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                                        • Instruction ID: b085f3065cf9cd100f04f322da00d4b037e108fc79bf5967fdabce1cd6d2e74b
                                                        • Opcode Fuzzy Hash: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                                        • Instruction Fuzzy Hash: 7B116971790704B7F620AB958C8AF5A7399EF88B11F20080DF790AB1C1C9F5E4418B7C
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AddressProc_malloc$_strcat_strlen
                                                        • String ID: AU3_FreeVar
                                                        • API String ID: 2184576858-771828931
                                                        • Opcode ID: 10d9e78008ba5b5703de8dc23ed72c3cd296113dc033390a1be7ca980e1f1503
                                                        • Instruction ID: c940ad03d776ce5ee908f8b881b33357b51647545ffc53e819ca791e1fdac2da
                                                        • Opcode Fuzzy Hash: 10d9e78008ba5b5703de8dc23ed72c3cd296113dc033390a1be7ca980e1f1503
                                                        • Instruction Fuzzy Hash: EDA18DB5604205DFC300DF59C480A2AB7E5FFC8319F1489AEE9554B362D739ED89CB8A
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AA5A
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AA8D
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0044AAF9
                                                        • InternetSetOptionW.WININET(00000000,0000001F,?,00000004), ref: 0044AB11
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB20
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,00000000,00000000), ref: 0044AB61
                                                          • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                        • String ID:
                                                        • API String ID: 1291720006-3916222277
                                                        • Opcode ID: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                                        • Instruction ID: 782b6278bf246bef60821ca34847c3ce69a0d92f774604c9678bedd135ce19ea
                                                        • Opcode Fuzzy Hash: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                                        • Instruction Fuzzy Hash: 9C51E6B12803016BF320EB65CD85FBBB7A8FB89704F00091EF74196181D7B9A548C76A
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastselect
                                                        • String ID: HH
                                                        • API String ID: 215497628-2761332787
                                                        • Opcode ID: 0de0448ade90d459e176b7eabd0eb7793c39b194d41e4bdd7ff4fb8690f4e17f
                                                        • Instruction ID: a252b81ccbce03d1e7b1b0efababa2c0a0929072778302a7b1202b90a7697d70
                                                        • Opcode Fuzzy Hash: 0de0448ade90d459e176b7eabd0eb7793c39b194d41e4bdd7ff4fb8690f4e17f
                                                        • Instruction Fuzzy Hash: BF51E4726043005BD320EB65DC42F9BB399EB94324F044A2EF558E7281EB79E944C7AA
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __snwprintf__wcsicoll_wcscpy
                                                        • String ID: , $$0vH$AUTOITCALLVARIABLE%d$CALLARGARRAY
                                                        • API String ID: 1729044348-3708979750
                                                        • Opcode ID: e5856c69d37335927e932bb259c431c810e65197c095b32473e915812f67d75c
                                                        • Instruction ID: 823d0c4529048d9f890bbf28e75db1a658c609af9319d28fcdda535ef0d13f31
                                                        • Opcode Fuzzy Hash: e5856c69d37335927e932bb259c431c810e65197c095b32473e915812f67d75c
                                                        • Instruction Fuzzy Hash: E651A571514300ABD610EF65C882ADFB3A4EFC4348F048D2FF54967291D779E949CBAA
                                                        APIs
                                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\0wxckB4Iba.exe,?,C:\Users\user\Desktop\0wxckB4Iba.exe,004A8E80,C:\Users\user\Desktop\0wxckB4Iba.exe,0040F3D2), ref: 0040FFCA
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BC04
                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BC38
                                                        • _wcscat.LIBCMT ref: 0044BCAA
                                                        • _wcslen.LIBCMT ref: 0044BCB7
                                                        • _wcslen.LIBCMT ref: 0044BCCB
                                                        • SHFileOperationW.SHELL32 ref: 0044BD16
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 2326526234-1173974218
                                                        • Opcode ID: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                                        • Instruction ID: 9e4979448571685848097db6772507fbfe8bfb8d1337cd0032b1ea927bdad9db
                                                        • Opcode Fuzzy Hash: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                                        • Instruction Fuzzy Hash: 4B3183B14083019AD724EF21C5D5ADFB3E4EFC8304F444D6EB98993251EB39E608D7AA
                                                        APIs
                                                          • Part of subcall function 00436328: _wcsncpy.LIBCMT ref: 0043633C
                                                        • _wcslen.LIBCMT ref: 004366DD
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00436700
                                                        • GetLastError.KERNEL32 ref: 0043670F
                                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00436727
                                                        • _wcsrchr.LIBCMT ref: 0043674C
                                                          • Part of subcall function 004366BE: CreateDirectoryW.KERNEL32(?,00000000,?,00000000,00000000), ref: 0043678F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                        • String ID: \
                                                        • API String ID: 321622961-2967466578
                                                        • Opcode ID: 1eb455b432650c328f353f4bd1bc621d200bc06401c5471b489e88a9126e4646
                                                        • Instruction ID: 68cadaa88695c7c006562ade17844284f7fc34f8e7e15af3b97584e331f528d6
                                                        • Opcode Fuzzy Hash: 1eb455b432650c328f353f4bd1bc621d200bc06401c5471b489e88a9126e4646
                                                        • Instruction Fuzzy Hash: 3C2148765003017ADB20A724EC47AFF33989F95764F90993EFD14D6281E779950882AE
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 1038674560-2734436370
                                                        • Opcode ID: 8fabdde956d602f6b8b7368bcff20dfc7d0b0c72369e2d81c3549115c9808aba
                                                        • Instruction ID: f72ce1d64a5a3b865947b719243e4701f1ba8c8209579f194a7ae3ad15c73224
                                                        • Opcode Fuzzy Hash: 8fabdde956d602f6b8b7368bcff20dfc7d0b0c72369e2d81c3549115c9808aba
                                                        • Instruction Fuzzy Hash: 1B21F87261161067E730B659DCC2BDB63985F65305F04406BF800AA247D6ADA98A83AA
                                                        APIs
                                                        • DeleteObject.GDI32(?), ref: 0044157D
                                                        • GetDC.USER32(00000000), ref: 00441585
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00441590
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0044159B
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,000000FF,000000FF,000000FF,00000001,00000004,00000000,?,00000000,00000000), ref: 004415E9
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00441601
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00441639
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00441659
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                                        • Instruction ID: 4e191e68d33858d232da06d8f8bca50b2e2c885119a5133d865ec5329e905ca2
                                                        • Opcode Fuzzy Hash: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                                        • Instruction Fuzzy Hash: 1531C172240344BBE7208B14CD49FAB77EDEB88B15F08450DFB44AA2D1DAB4ED808B64
                                                        APIs
                                                        • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                        • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                        • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                                        • ExitThread.KERNEL32 ref: 0041410F
                                                        • GetCurrentThreadId.KERNEL32 ref: 00414115
                                                        • __freefls@4.LIBCMT ref: 00414135
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                        • String ID:
                                                        • API String ID: 1925773019-0
                                                        • Opcode ID: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                                        • Instruction ID: d0499dd1a11a7aa3f5f6b81cdb2be0183561266298d4129ec5ef95b8f2f1ff50
                                                        • Opcode Fuzzy Hash: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                                        • Instruction Fuzzy Hash: 12018430000200ABC704BFB2DD0D9DE7BA9AF95345722886EF90497212DA3CC9C28B5C
                                                        APIs
                                                        • VariantClear.OLEAUT32(00000038), ref: 004357C3
                                                        • VariantClear.OLEAUT32(00000058), ref: 004357C9
                                                        • VariantClear.OLEAUT32(00000068), ref: 004357CF
                                                        • VariantClear.OLEAUT32(00000078), ref: 004357D5
                                                        • VariantClear.OLEAUT32(00000088), ref: 004357DE
                                                        • VariantClear.OLEAUT32(00000048), ref: 004357E4
                                                        • VariantClear.OLEAUT32(00000098), ref: 004357ED
                                                        • VariantClear.OLEAUT32(000000A8), ref: 004357F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                                        • Instruction ID: 4669651a97e20320d925a323ac357da1b1419afffb7c9eb93274aad60c959a81
                                                        • Opcode Fuzzy Hash: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                                        • Instruction Fuzzy Hash: BDF03CB6400B446AC235EB79DC40BD7B7E86F89200F018E1DE58783514DA78F588CB64
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?,?), ref: 00464ADE
                                                          • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                                        • inet_addr.WSOCK32(?,00000000,?,?,00000101,?,?), ref: 00464B1F
                                                        • gethostbyname.WSOCK32(?,?,00000000,?,?,00000101,?,?), ref: 00464B29
                                                        • _memset.LIBCMT ref: 00464B92
                                                        • GlobalAlloc.KERNEL32(00000040,00000040), ref: 00464B9E
                                                        • GlobalFree.KERNEL32(00000000), ref: 00464CDE
                                                        • WSACleanup.WSOCK32 ref: 00464CE4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memsetgethostbynameinet_addr
                                                        • String ID:
                                                        • API String ID: 3424476444-0
                                                        • Opcode ID: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                                        • Instruction ID: 8d90feaebe95447676150adcea4a136074f650e12d33839f26a9dde16614cdb7
                                                        • Opcode Fuzzy Hash: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                                        • Instruction Fuzzy Hash: A3A17EB1504300AFD710EF65C982F9BB7E8AFC8714F54491EF64497381E778E9058B9A
                                                        APIs
                                                        • GetSystemMetrics.USER32(0000000F), ref: 00440B7B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MetricsSystem
                                                        • String ID:
                                                        • API String ID: 4116985748-0
                                                        • Opcode ID: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                                        • Instruction ID: 1e23dbab6d9439f1299be2c39bdf7de0481ead398f869a6d5eaf0ea33fa99bdf
                                                        • Opcode Fuzzy Hash: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                                        • Instruction Fuzzy Hash: 8EA19C70608701DBE314CF68C984B6BBBE1FB88704F14491EFA8593251E778F965CB5A
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AC62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ConnectRegistry_wcslen
                                                        • String ID:
                                                        • API String ID: 535477410-0
                                                        • Opcode ID: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                                        • Instruction ID: 71109d01e6e71572d3d886d5d9f1e4ab699fb1be984f768d753da2f0a00da466
                                                        • Opcode Fuzzy Hash: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                                        • Instruction Fuzzy Hash: BBA18EB1204300AFC710EF65C885B1BB7E4BF85704F14896EF685AB292D779E905CB9B
                                                        APIs
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • _memset.LIBCMT ref: 004538C4
                                                        • GetMenuItemInfoW.USER32(?,?), ref: 004538EF
                                                        • _wcslen.LIBCMT ref: 00453960
                                                        • SetMenuItemInfoW.USER32(00000011,?,00000000,?), ref: 004539C4
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000,?,?), ref: 004539E0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info_wcslen$Default_memset_wcscpy
                                                        • String ID: 0
                                                        • API String ID: 3530711334-4108050209
                                                        • Opcode ID: c8c2b72c749714a23e45c10816ef9459d7fe91b5f095051f547869ed1843acb9
                                                        • Instruction ID: 97d09e0af2b4d046480d7fb626e7fa0667c22e7462995616ff61acde959b3bac
                                                        • Opcode Fuzzy Hash: c8c2b72c749714a23e45c10816ef9459d7fe91b5f095051f547869ed1843acb9
                                                        • Instruction Fuzzy Hash: 747118F15083015AD714DF65C881B6BB7E4EB98396F04491FFD8082292D7BCDA4CC7AA
                                                        APIs
                                                        • GetCurrentProcessId.KERNEL32(?), ref: 00473A00
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00473A0E
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00473A34
                                                        • CloseHandle.KERNEL32(00000000,00000000,?,00000028), ref: 00473C01
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                        • String ID: HH
                                                        • API String ID: 3488606520-2761332787
                                                        • Opcode ID: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                                        • Instruction ID: 2161edc7e7eefe464b48455ffcea7dd3157e2cbe85e131cccd8837112284b0a3
                                                        • Opcode Fuzzy Hash: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                                        • Instruction Fuzzy Hash: 3581BF71A043019FD320EF69C882B5BF7E4AF84744F108C2EF598AB392D675E945CB96
                                                        APIs
                                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                        • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                                        • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                                        • LineTo.GDI32(?,?), ref: 004474BF
                                                        • CloseFigure.GDI32(?), ref: 004474C6
                                                        • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                                        • Rectangle.GDI32(?,?), ref: 004474F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                        • String ID:
                                                        • API String ID: 4082120231-0
                                                        • Opcode ID: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                                        • Instruction ID: e2e17d079c8faeb919f1a119f9aa9df975eabc7d00289576b12f70c1741c819b
                                                        • Opcode Fuzzy Hash: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                                        • Instruction Fuzzy Hash: BC713AB11083419FD300DF15C884E6BBBE9EFC9708F148A1EF99497351D778A906CBAA
                                                        APIs
                                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                        • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                                        • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                                        • LineTo.GDI32(?,?), ref: 004474BF
                                                        • CloseFigure.GDI32(?), ref: 004474C6
                                                        • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                                        • Rectangle.GDI32(?,?), ref: 004474F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                        • String ID:
                                                        • API String ID: 4082120231-0
                                                        • Opcode ID: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                                        • Instruction ID: 71053adf7dd607ae91079c2ca5de7ffea4483cc305881a9741cc2e8bc8d6f2cf
                                                        • Opcode Fuzzy Hash: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                                        • Instruction Fuzzy Hash: 55613BB51083419FD300DF55CC84E6BBBE9EBC9308F148A1EF99597351D738A906CB6A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AngleCloseEllipseFigureLineMovePixelRectangle
                                                        • String ID:
                                                        • API String ID: 288456094-0
                                                        • Opcode ID: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                                        • Instruction ID: d3db7697bfba14f4a3ad6627a8a5faa1010559558ae5e3f89cc6b0bd66950af4
                                                        • Opcode Fuzzy Hash: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                                        • Instruction Fuzzy Hash: 90514BB51082419FD300DF15CC84E6BBBE9EFC9308F14891EF99497351D734A906CB6A
                                                        APIs
                                                        • GetParent.USER32(?), ref: 004449B0
                                                        • GetKeyboardState.USER32(?), ref: 004449C3
                                                        • SetKeyboardState.USER32(?), ref: 00444A0F
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00444A3F
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00444A60
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444AAC
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444AD1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                                        • Instruction ID: 19c159416ad4887e81d4090d30fbb5c505c675cee05c330e2fd8e115592bd25d
                                                        • Opcode Fuzzy Hash: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                                        • Instruction Fuzzy Hash: B651C5A05487D139F7369234884ABA7BFD55F8A304F08CA4EF1E5156C3D2ECE984C769
                                                        APIs
                                                        • GetParent.USER32(?), ref: 00444BA9
                                                        • GetKeyboardState.USER32(?), ref: 00444BBC
                                                        • SetKeyboardState.USER32(?), ref: 00444C08
                                                        • PostMessageW.USER32(?,00000100,00000010,?), ref: 00444C35
                                                        • PostMessageW.USER32(?,00000100,00000011,?), ref: 00444C53
                                                        • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444C9C
                                                        • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444CBE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                                        • Instruction ID: 4493abccadab05ae7d00f733e1fa63583af0c494729619d74f1516a50adc8d80
                                                        • Opcode Fuzzy Hash: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                                        • Instruction Fuzzy Hash: A951E4F05097D139F7369364884ABA7BFE46F8A304F088A4EF1D5065C2D2ACE984C769
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                                        • Instruction ID: b3b3da583a0ae8cfa3180eda0e634cae40a493ebdfd517dbec9d2fd4fbd82cb1
                                                        • Opcode Fuzzy Hash: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                                        • Instruction Fuzzy Hash: 1E513A315082909FE321CF14DC89FABBB64FB46320F18456FF895AB2D1D7649C06D7AA
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AA77
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ConnectRegistry_wcslen
                                                        • String ID: HH
                                                        • API String ID: 535477410-2761332787
                                                        • Opcode ID: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                                        • Instruction ID: 7b41397762752e7dec08e47bcdb2cb2f58790b6f4670524580eb9da3090621e6
                                                        • Opcode Fuzzy Hash: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                                        • Instruction Fuzzy Hash: A2516D71208301AFD304EF65C981F5BB7A9BFC4704F40892EF685A7291D678E905CB6B
                                                        APIs
                                                        • _memset.LIBCMT ref: 00457C34
                                                        • _memset.LIBCMT ref: 00457CE8
                                                        • ShellExecuteExW.SHELL32(?), ref: 00457D34
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • CloseHandle.KERNEL32(?), ref: 00457DDD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseExecuteHandleShell_wcscpy_wcslen
                                                        • String ID: <$@
                                                        • API String ID: 1325244542-1426351568
                                                        • Opcode ID: bce0cc86945754dfb230170ecd4c21a915d6526e7c9b1e7fd723952314da78dd
                                                        • Instruction ID: 09e461bdfc47c8bdd671eddb31188d347eda7c51057725e13e77015b5001baed
                                                        • Opcode Fuzzy Hash: bce0cc86945754dfb230170ecd4c21a915d6526e7c9b1e7fd723952314da78dd
                                                        • Instruction Fuzzy Hash: EA510FB55083009FC710EF61D985A5BB7E4AF84709F00492EFD44AB392DB39ED48CB9A
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32(?,?,?,?,?,?,?,?,?,00000002,00000000,00000014), ref: 0047379B
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 004737A8
                                                        • __wsplitpath.LIBCMT ref: 004737E1
                                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                        • _wcscat.LIBCMT ref: 004737F6
                                                        • __wcsicoll.LIBCMT ref: 00473818
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00473844
                                                        • CloseHandle.KERNEL32(00000000,00000000,?,?), ref: 00473852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                        • String ID:
                                                        • API String ID: 2547909840-0
                                                        • Opcode ID: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                                        • Instruction ID: 8efa427203ffd7a45d167e3a64f6abf3f3640219bb0751621114887cb14f0fc1
                                                        • Opcode Fuzzy Hash: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                                        • Instruction Fuzzy Hash: 4751BB71544304A7D720EF61CC86FDBB3E8AF84748F00492EF58957182E775E645C7AA
                                                        APIs
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 004552B7
                                                        • ImageList_Remove.COMCTL32(?,?,?,?), ref: 004552EB
                                                        • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004553D3
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                        • String ID:
                                                        • API String ID: 2354583917-0
                                                        • Opcode ID: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                                        • Instruction ID: 19c5dc8500d05a42ca126c51664c70dafe1d1a8ca3b523478e8997b137d6e309
                                                        • Opcode Fuzzy Hash: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                                        • Instruction Fuzzy Hash: 77519D30204A419FC714DF24C4A4B7A77E5FB49301F4486AEFD9ACB392DB78A849CB54
                                                        APIs
                                                        • LoadLibraryW.KERNEL32(00000000), ref: 00463DD1
                                                        • GetProcAddress.KERNEL32(?,?), ref: 00463E68
                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00463E84
                                                        • GetProcAddress.KERNEL32(?,?), ref: 00463ECE
                                                        • FreeLibrary.KERNEL32(?,?,?,00000000,?), ref: 00463EF0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$Library$FreeLoad
                                                        • String ID: Wu
                                                        • API String ID: 2449869053-4083010176
                                                        • Opcode ID: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                                        • Instruction ID: 5a5949aabc30296464acd143044f95cbdcafad8a77d2d24e7d672d776762960f
                                                        • Opcode Fuzzy Hash: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                                        • Instruction Fuzzy Hash: 9051C1752043409FC300EF25C881A5BB7A4FF89305F00456EF945A73A2DB79EE45CBAA
                                                        APIs
                                                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                        • GetMenu.USER32 ref: 004776AA
                                                        • GetMenuItemCount.USER32(00000000), ref: 004776CC
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004776FB
                                                        • _wcslen.LIBCMT ref: 0047771A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Menu$CountItemStringWindow_wcslen
                                                        • String ID:
                                                        • API String ID: 1823500076-0
                                                        • Opcode ID: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                                        • Instruction ID: 4b9e656becebfc5f52f27a1d7ad2c07a58398098864d75d3a5ce1c02cc274359
                                                        • Opcode Fuzzy Hash: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                                        • Instruction Fuzzy Hash: 174117715083019FD320EF25CC45BABB3E8BF88314F10492EF55997252D7B8E9458BA9
                                                        APIs
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0044890A
                                                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 00448920
                                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$Enable$Show$MessageMoveSend
                                                        • String ID:
                                                        • API String ID: 896007046-0
                                                        • Opcode ID: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                                        • Instruction ID: 0809a8548e22334437b8974569d6adfa08582830463fbdb99c3481629354d751
                                                        • Opcode Fuzzy Hash: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                                        • Instruction Fuzzy Hash: 63419E746043419FF7248B24C884B6FB7A1FB99305F18886EF98197391DA78A845CB59
                                                        APIs
                                                        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                                        • SendMessageW.USER32(00BC1A68,000000F1,00000000,00000000), ref: 004414C6
                                                        • SendMessageW.USER32(00BC1A68,000000F1,00000001,00000000), ref: 004414F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow
                                                        • String ID:
                                                        • API String ID: 312131281-0
                                                        • Opcode ID: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                                        • Instruction ID: f6a862a32ccfd92e4f153a1965fa7dc80102ffdb8abe4b8a046001f82176c48d
                                                        • Opcode Fuzzy Hash: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                                        • Instruction Fuzzy Hash: 2F416A347442019FE720CF58DCC4F6A77A5FB8A754F24416AE5519B3B1CB75AC82CB48
                                                        APIs
                                                        • _memset.LIBCMT ref: 004484C4
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 00448562
                                                        • IsMenu.USER32(?), ref: 0044857B
                                                        • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 004485D0
                                                        • DrawMenuBar.USER32 ref: 004485E4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$DrawInfoInsert_memset
                                                        • String ID: 0
                                                        • API String ID: 3866635326-4108050209
                                                        • Opcode ID: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                                        • Instruction ID: c1b4c65bd9dbf201e14e83578cc8030a3c247867dd5f1e451e409e2153a24926
                                                        • Opcode Fuzzy Hash: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                                        • Instruction Fuzzy Hash: 9F417F75604341AFE710CF45C984B6BB7E4FB89304F14881EFA554B391DBB4E849CB5A
                                                        APIs
                                                        • InterlockedIncrement.KERNEL32 ref: 0047247C
                                                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472491
                                                        • Sleep.KERNEL32(0000000A), ref: 00472499
                                                        • InterlockedIncrement.KERNEL32(004A7CAC), ref: 004724A4
                                                        • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472599
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Interlocked$DecrementIncrement$Sleep
                                                        • String ID: 0vH
                                                        • API String ID: 327565842-3662162768
                                                        • Opcode ID: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                                                        • Instruction ID: 7246262c18bb701d5349304b0e2d21290bf7c9637501dd5a114e6955e8e78370
                                                        • Opcode Fuzzy Hash: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                                                        • Instruction Fuzzy Hash: 9631D2329082259BD710DF28DD41A8A77A5EB95324F05483EFD08FB251DB78EC498BED
                                                        APIs
                                                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448B16
                                                        • GetFocus.USER32 ref: 00448B1C
                                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$Enable$Show$FocusMessageSend
                                                        • String ID:
                                                        • API String ID: 3429747543-0
                                                        • Opcode ID: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                                        • Instruction ID: 96ed947056310062a3fa6d2350adc65d304252fdbf70c479ab88671ed4e09c2c
                                                        • Opcode Fuzzy Hash: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                                        • Instruction Fuzzy Hash: FC31B4706443819BF7248E14C8C4BAFB7D0EB95745F04492EF981A6291DBA89845C719
                                                        APIs
                                                        • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042A9B0
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • _memset.LIBCMT ref: 00401C62
                                                        • _wcsncpy.LIBCMT ref: 00401CA1
                                                        • _wcscpy.LIBCMT ref: 00401CBD
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_memset_wcscpy_wcslen_wcsncpy
                                                        • String ID: Line:
                                                        • API String ID: 1620655955-1585850449
                                                        • Opcode ID: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                                        • Instruction ID: a4e7cf3abc31881c2b93aaae0beefbbd48c64772eea77d32b53e92a0700a02c6
                                                        • Opcode Fuzzy Hash: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                                        • Instruction Fuzzy Hash: 7431D47151C301ABD324EB11DC41BDB77E8AF94314F04493FF989521A1DB78AA49C79B
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D32F
                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3B3
                                                        • __swprintf.LIBCMT ref: 0045D3CC
                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D416
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume__swprintf
                                                        • String ID: %lu$HH
                                                        • API String ID: 3164766367-3924996404
                                                        • Opcode ID: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                                        • Instruction ID: e4de0c6df68350460ad5232616e5185c9d799459bd1b640414cfcbd8d86849a8
                                                        • Opcode Fuzzy Hash: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                                        • Instruction Fuzzy Hash: 85314A716083019BC310EF55D941A5BB7E4FF88704F40892EFA4597292D774EA09CB9A
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450E24
                                                        • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450E35
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450E43
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450E54
                                                        • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450E62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 3850602802-3636473452
                                                        • Opcode ID: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                                        • Instruction ID: b51c377fab27852337593a8f268aff884918310fa347e0537580fa9f3b853d23
                                                        • Opcode Fuzzy Hash: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                                        • Instruction Fuzzy Hash: 2C2121712543007AE7209A65DC42F5BB3E9AFD8B24F214A0EF754B72D1C6B4F8418B58
                                                        APIs
                                                        • ImageList_Destroy.COMCTL32(?), ref: 00455451
                                                        • ImageList_Destroy.COMCTL32(?), ref: 0045545F
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                                        • String ID:
                                                        • API String ID: 3985565216-0
                                                        • Opcode ID: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                                        • Instruction ID: 02eb1b45cc7e926b76574f27881fb1e8d9d372094f4d7b34cf8607babd6cb63d
                                                        • Opcode Fuzzy Hash: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                                        • Instruction Fuzzy Hash: EA213270200A019FCB20DF65CAD4B2A77A9BF45312F50855EED45CB352DB39EC45CB69
                                                        APIs
                                                        • ___set_flsgetvalue.LIBCMT ref: 00415737
                                                        • __calloc_crt.LIBCMT ref: 00415743
                                                        • __getptd.LIBCMT ref: 00415750
                                                        • CreateThread.KERNEL32(00000000,?,0041568B,00000000,00000004,00000000), ref: 00415776
                                                        • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00415786
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00415791
                                                        • __dosmaperr.LIBCMT ref: 004157A9
                                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1269668773-0
                                                        • Opcode ID: bb8068f02d799d687f86b9c43e1e9df3108372b57b840b2ce394e22bf251b6d0
                                                        • Instruction ID: 083f1b3d72dc2b4e3073d7627409da2efaae6cca9fbdfa2eb2c15b7cb2a145f7
                                                        • Opcode Fuzzy Hash: bb8068f02d799d687f86b9c43e1e9df3108372b57b840b2ce394e22bf251b6d0
                                                        • Instruction Fuzzy Hash: 4511E672501604EFC720AF76DC868DF7BA4EF80334F21412FF525922D1DB788981966D
                                                        APIs
                                                          • Part of subcall function 00438FE4: GetProcessHeap.KERNEL32(00000008,0000000C,0043910A,00000000,00000000,00000000,0044646E,?,?,?), ref: 00438FE8
                                                          • Part of subcall function 00438FE4: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FEF
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,0044646E,?,?,?), ref: 00439119
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439123
                                                        • DuplicateHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043912C
                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00439138
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439142
                                                        • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00439145
                                                        • CreateThread.KERNEL32(00000000,00000000,004390C2,00000000,00000000,00000000), ref: 0043915E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                                        • Instruction ID: b388a4287fabc35bf2088fa38ebc9459a42e34e8a642192e1b63b89709cb9be3
                                                        • Opcode Fuzzy Hash: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                                        • Instruction Fuzzy Hash: 3BF0CD753413007BD220EB65DC86F5BB7A8EBC9B10F118919F6049B1D1C6B4A800CB65
                                                        APIs
                                                        • ___set_flsgetvalue.LIBCMT ref: 00415690
                                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                        • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                        • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                                        • ExitThread.KERNEL32 ref: 004156BD
                                                        • __freefls@4.LIBCMT ref: 004156D9
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                        • String ID:
                                                        • API String ID: 4166825349-0
                                                        • Opcode ID: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                                        • Instruction ID: 1015f584654e325efa3cacb901eba7c9ae2b5aefa54885f90b4e6d99173acdac
                                                        • Opcode Fuzzy Hash: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                                        • Instruction Fuzzy Hash: 14F049745007009BD704BF72DD159DE7B69AF85345761C85FB80897222DA3DC9C1CB9C
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(advapi32.dll,p#D,0043415E,p#D,?,00442370,?), ref: 00434134
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00434146
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll$p#D$p#D
                                                        • API String ID: 2574300362-3261711971
                                                        • Opcode ID: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                                        • Instruction ID: cb82693085896f9455b4638215a98dd7e3cb824177552166877179ce6000b7c2
                                                        • Opcode Fuzzy Hash: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                                        • Instruction Fuzzy Hash: D8D05EB0400B039FCB105F24D8086AB76F4EB68700F208C2EF989A3750C7B8E8C0CB68
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                                        • Instruction ID: be39947db1ffbcb7075193c31d102fc15fe4f6af8d23ce90efbce3d2b6a77a88
                                                        • Opcode Fuzzy Hash: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                                        • Instruction Fuzzy Hash: 4BF16D71108740AFD210DB59C880EABB7F9EFCA744F10891EF69983261D735AC45CBAA
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 00433724
                                                        • GetWindowRect.USER32(00000000,?), ref: 00433757
                                                        • GetClientRect.USER32(0000001D,?), ref: 004337AC
                                                        • GetSystemMetrics.USER32(0000000F), ref: 00433800
                                                        • GetWindowRect.USER32(?,?), ref: 00433814
                                                        • ScreenToClient.USER32(?,?), ref: 00433842
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Rect$Client$Window$MetricsScreenSystem
                                                        • String ID:
                                                        • API String ID: 3220332590-0
                                                        • Opcode ID: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                                        • Instruction ID: 40e56d112be44df416332e5c874318f33691c6b0c201ea6c9f9086adb5117cf0
                                                        • Opcode Fuzzy Hash: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                                        • Instruction Fuzzy Hash: E9A126B42147028AC324CF68C5847ABBBF1FF98715F04991EE9D983360E775E908CB5A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _malloc_wcslen$_strcat_wcscpy
                                                        • String ID:
                                                        • API String ID: 1612042205-0
                                                        • Opcode ID: b8a3413a850b3e9d022a14bc02158d0a95917de16b2476bc53e0af5cb97ab780
                                                        • Instruction ID: 39b6431fb86a1cae222df6ecce28f21653e085caad8de22f1e35678e4483a9b6
                                                        • Opcode Fuzzy Hash: b8a3413a850b3e9d022a14bc02158d0a95917de16b2476bc53e0af5cb97ab780
                                                        • Instruction Fuzzy Hash: CD613B70504202EFCB10EF29D58096AB3E5FF48305B50496EF8859B306D738EE59DB9A
                                                        APIs
                                                        • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C588
                                                        • SetKeyboardState.USER32(00000080), ref: 0044C59B
                                                        • PostMessageW.USER32(?,00000104,?,?), ref: 0044C5EC
                                                        • PostMessageW.USER32(?,00000100,?,?), ref: 0044C610
                                                        • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C637
                                                        • SendInput.USER32 ref: 0044C6E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$InputSend
                                                        • String ID:
                                                        • API String ID: 2221674350-0
                                                        • Opcode ID: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                                        • Instruction ID: 3a634557d1668dba9f4fbb3ffee1259adddcddb7f3fce46f2ce6721246940f3b
                                                        • Opcode Fuzzy Hash: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                                        • Instruction Fuzzy Hash: A24148725053486AF760EF209C80BFFBB98EF95324F04151FFDC412281D66E984987BA
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$_wcscat
                                                        • String ID:
                                                        • API String ID: 2037614760-0
                                                        • Opcode ID: 43efba16cd806b31402fe34b2becc3a5af32a5b4a383a164d4ea5773e04486ac
                                                        • Instruction ID: 871aa96d6b0d5f43eceffdadd72b032f7becd6ba50fbda5e2bca5dd503650597
                                                        • Opcode Fuzzy Hash: 43efba16cd806b31402fe34b2becc3a5af32a5b4a383a164d4ea5773e04486ac
                                                        • Instruction Fuzzy Hash: 7D41BD31901A256BDE317F55D880BBB7358DFA1314F84006FF98247313EA6E5892C6BE
                                                        APIs
                                                        • BeginPaint.USER32(00000000,?,004A83D8,?), ref: 00447B9D
                                                        • GetWindowRect.USER32(?,?), ref: 00447C1B
                                                        • ScreenToClient.USER32(?,?), ref: 00447C39
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                                        • EndPaint.USER32(?,?), ref: 00447CD1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                        • String ID:
                                                        • API String ID: 4189319755-0
                                                        • Opcode ID: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                                        • Instruction ID: de699fe3e67e71f806f86ee7feca1bcffcb0489daa19151882f3061068cc4b26
                                                        • Opcode Fuzzy Hash: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                                        • Instruction Fuzzy Hash: D14182705043019FE320DF15C8C8F7B7BA8EB89724F04466EF9548B391DB74A846CB69
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B490
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4C2
                                                        • EnterCriticalSection.KERNEL32(00000000), ref: 0044B4E3
                                                        • LeaveCriticalSection.KERNEL32(00000000), ref: 0044B5A0
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B5BB
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5D1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID:
                                                        • API String ID: 1726766782-0
                                                        • Opcode ID: d1f4c8b32701f3515452156a35d83f93081eba70680028f938022ee8972e20b1
                                                        • Instruction ID: bf52b5dc2e344941501510e432fc863898df75637e45487ca8cd05157db66b41
                                                        • Opcode Fuzzy Hash: d1f4c8b32701f3515452156a35d83f93081eba70680028f938022ee8972e20b1
                                                        • Instruction Fuzzy Hash: 09415C75104701AFD320EF26D845EABB3F8EF88708F008E2DF59A92650D774E945CB6A
                                                        APIs
                                                        • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 004410F9
                                                        • EnableWindow.USER32(?,00000000), ref: 0044111A
                                                        • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 00441183
                                                        • ShowWindow.USER32(?,00000004,?,?,?,00448962,004A83D8,?,?), ref: 00441192
                                                        • EnableWindow.USER32(?,00000001), ref: 004411B3
                                                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 004411D5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID:
                                                        • API String ID: 642888154-0
                                                        • Opcode ID: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                                        • Instruction ID: 824eeaafe1f931a994963cd163acc5b0ce47b26168a6fd4ee38d593e4569daee
                                                        • Opcode Fuzzy Hash: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                                        • Instruction Fuzzy Hash: 14417770604245DFE725CF14C984FA6B7E5BF89300F1886AEE6859B3B2CB74A881CB55
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 004490E3
                                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004490F8
                                                        • SendMessageW.USER32(00000000,0000111E,00000000,?), ref: 0044910D
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00449124
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 0044912F
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0044913C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow$InvalidateRect
                                                        • String ID:
                                                        • API String ID: 1976402638-0
                                                        • Opcode ID: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                                        • Instruction ID: 8b80d2acd15126bdfc8b54909556444574c0e56a9806921f1e0b477f33817628
                                                        • Opcode Fuzzy Hash: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                                        • Instruction Fuzzy Hash: F231B476244202AFF224DF04DC89FBBB7A9F785321F14492EF291973D0CA75AC469729
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 00442597
                                                          • Part of subcall function 004344B7: GetWindowRect.USER32(?,?), ref: 004344D3
                                                        • GetDesktopWindow.USER32 ref: 004425BF
                                                        • GetWindowRect.USER32(00000000), ref: 004425C6
                                                        • mouse_event.USER32(00008001,?,?,?,?), ref: 004425F5
                                                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                        • GetCursorPos.USER32(?), ref: 00442624
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00442690
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                        • String ID:
                                                        • API String ID: 4137160315-0
                                                        • Opcode ID: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                                        • Instruction ID: 1581b522c3ee05a339ffa1fd07f9e8cd23967deed6539873686ea33d82c69dd2
                                                        • Opcode Fuzzy Hash: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                                        • Instruction Fuzzy Hash: 7C31C1B2104306ABD310DF54CD85E6BB7E9FB98304F004A2EF94597281E675E9058BA6
                                                        APIs
                                                        • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044886C
                                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$Enable$Show$MessageSend
                                                        • String ID:
                                                        • API String ID: 1871949834-0
                                                        • Opcode ID: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                                        • Instruction ID: fbfed122d4da650e42f877d7e8bff2bfe9b33138fa51555fe8345b8bcc16d821
                                                        • Opcode Fuzzy Hash: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                                        • Instruction Fuzzy Hash: A731F3B07443819BF7248E14C8C4BAFB7D0AB95345F08482EF981A63D1DBAC9846872A
                                                        APIs
                                                        • _memset.LIBCMT ref: 0044961A
                                                        • SendMessageW.USER32 ref: 0044964A
                                                          • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 004496AC
                                                        • _wcslen.LIBCMT ref: 004496BA
                                                        • _wcslen.LIBCMT ref: 004496C7
                                                        • SendMessageW.USER32(?,00001074,?,?), ref: 004496FD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen$_memset_wcspbrk
                                                        • String ID:
                                                        • API String ID: 1624073603-0
                                                        • Opcode ID: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                                        • Instruction ID: 7e49a266cf7116299f7bc8659d1ce07b00adedb8b3f1b428e1954e4b11147a1e
                                                        • Opcode Fuzzy Hash: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                                        • Instruction Fuzzy Hash: B631CA71508300AAE720DF15DC81BEBB7D4EBD4720F504A1FFA54862D0EBBAD945C7A6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                                        • Instruction ID: 0263b137e1f68684b0dae4bb7f633391a2f723f0f4072b7ce39308acd6c8c458
                                                        • Opcode Fuzzy Hash: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                                        • Instruction Fuzzy Hash: 31219272245110ABE7108B68DCC4B6F7798EB96374F240A3AF512C61E1EA7998C1C769
                                                        APIs
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004555AD
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: DestroyWindow$DeleteObject$IconMove
                                                        • String ID:
                                                        • API String ID: 1640429340-0
                                                        • Opcode ID: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                                        • Instruction ID: 2ee25f48dcb0ad8048bc4d9c922f6cac320a9d705fdb810e808868a6102f62dc
                                                        • Opcode Fuzzy Hash: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                                        • Instruction Fuzzy Hash: 05312770200A419FD724DF24C998B3A73F9FB44312F4485AAE945CB266E778EC49CB69
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteMenuObject$IconWindow
                                                        • String ID:
                                                        • API String ID: 752480666-0
                                                        • Opcode ID: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                                        • Instruction ID: bf467a0aa8f060071afd9cdae546a2eb92d9c059e8a57ac1e588bb5f3fc3a395
                                                        • Opcode Fuzzy Hash: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                                        • Instruction Fuzzy Hash: 26215E30200A019FC724DF24D5E8B7AB7A9FB44312F50855EED498B392CB39EC89CB59
                                                        APIs
                                                        • DestroyWindow.USER32(00000000), ref: 0045527A
                                                        • ImageList_Destroy.COMCTL32(?), ref: 0045528C
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                        • String ID:
                                                        • API String ID: 3275902921-0
                                                        • Opcode ID: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                                        • Instruction ID: c357af2a313eda44c34a26cb015c973203dd8f66e4d80e74dc1abfaeb9ce60f9
                                                        • Opcode Fuzzy Hash: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                                        • Instruction Fuzzy Hash: 2D217E70604A019BC714DF79D99466AB7A5BF44311F40856EF919CB342DB38E849CF68
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,?,?,?,?,?,00446540,?,?,?,?,?,?,?,?,?), ref: 0043935D
                                                        • OpenProcessToken.ADVAPI32(00000000,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439364
                                                        • CreateEnvironmentBlock.USERENV(?,?,00000001,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439376
                                                        • CloseHandle.KERNEL32(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439383
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 004393C0
                                                        • DestroyEnvironmentBlock.USERENV(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 004393D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                                        • Instruction ID: 8c652321442b38080740e7d333ba663a52d3460857ef2618669649d87ea194c0
                                                        • Opcode Fuzzy Hash: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                                        • Instruction Fuzzy Hash: 7B2150B2208300ABD314CB65D854EABB7EDEBCD754F084E1DF989A3250C7B4E901CB25
                                                        APIs
                                                        • ___set_flsgetvalue.LIBCMT ref: 0041418F
                                                        • __calloc_crt.LIBCMT ref: 0041419B
                                                        • __getptd.LIBCMT ref: 004141A8
                                                        • CreateThread.KERNEL32(?,?,004140DB,00000000,?,?), ref: 004141DF
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 004141E9
                                                        • __dosmaperr.LIBCMT ref: 00414201
                                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1803633139-0
                                                        • Opcode ID: 9093ead1b57094de5194e295d789e60ec266b8318c1e976fb280fb1b07ce6f9a
                                                        • Instruction ID: ec3febacf030228bba34671a5a373aa86179f0c9a00f1e1343e4adce14cbcb36
                                                        • Opcode Fuzzy Hash: 9093ead1b57094de5194e295d789e60ec266b8318c1e976fb280fb1b07ce6f9a
                                                        • Instruction Fuzzy Hash: 1311DD72504209BFCB10AFA5DC828DF7BA8EF44368B20446EF50193151EB39C9C18A68
                                                        APIs
                                                        • ImageList_Destroy.COMCTL32(?), ref: 004555E8
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                        • String ID:
                                                        • API String ID: 3275902921-0
                                                        • Opcode ID: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                                        • Instruction ID: 9e206caaed87a4944845468030bda76e3f946505fe2e652cce1cc100bc4c7c20
                                                        • Opcode Fuzzy Hash: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                                        • Instruction Fuzzy Hash: BE2141702006409FCB25DF25C994A2B77A9FF44312F80856EED49CB352DB39EC4ACB59
                                                        APIs
                                                        • SendMessageW.USER32 ref: 004554DF
                                                        • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004554FA
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                        • String ID:
                                                        • API String ID: 3691411573-0
                                                        • Opcode ID: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                                        • Instruction ID: ead105b7aa3a144aa2df3f4c31681f961a0d6b706109639263d1a652a664e8ec
                                                        • Opcode Fuzzy Hash: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                                        • Instruction Fuzzy Hash: A5118F713046419BDB10DF68DD88A2A77A8FB58322F404A2AFE14DB2D1D775DC498B68
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$_wcstok$ExtentPoint32Text
                                                        • String ID:
                                                        • API String ID: 1814673581-0
                                                        • Opcode ID: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                                        • Instruction ID: 25d714350c6a951fb861184d208c8546153e966ae5ec0a2422e5c8358eb53325
                                                        • Opcode Fuzzy Hash: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                                        • Instruction Fuzzy Hash: F60125B19053126BC6209F95DC42B5BB7E8EF45760F11842AFD04E3340D7F8E84483EA
                                                        APIs
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362A7
                                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362B2
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362BA
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362C5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                                        • Instruction ID: c21ea81f2c38402705b15ef58ab4919efdb6e4f3ef0ac894e378511a69de5cf2
                                                        • Opcode Fuzzy Hash: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                                        • Instruction Fuzzy Hash: C411D031909306ABC700EF19DA8499FB7E4FFCCB11F828D2DF98592210D734C9498B96
                                                        APIs
                                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 0044721F
                                                        • LineTo.GDI32(?,?,?), ref: 00447227
                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447235
                                                        • LineTo.GDI32(?,?,?), ref: 0044723D
                                                        • EndPath.GDI32(?), ref: 0044724E
                                                        • StrokePath.GDI32(?), ref: 0044725C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                        • String ID:
                                                        • API String ID: 372113273-0
                                                        • Opcode ID: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                                        • Instruction ID: cf4011081099dc8586e946db52605055ec0608de7db987eb6b7af15cf0be2a5d
                                                        • Opcode Fuzzy Hash: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                                        • Instruction Fuzzy Hash: B7018F36105264BBE2119750EC4AF9FBBACEF8A710F14451DF70156191C7F42A0587BD
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0041098F
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410997
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004109A2
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004109AD
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 004109B5
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004109BD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                                        • Instruction ID: 14dd698fb88c41d3cb2937c08abaa7ad6cdafd80764dd657d9f2199fb51feb0a
                                                        • Opcode Fuzzy Hash: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                                        • Instruction Fuzzy Hash: 52112A6118ABC4ADD3329F694854A87FFE45FB6304F484A8ED1D607A43C195A60CCBBA
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 0044CBEF
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC00
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC09
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0044CC10
                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CC29
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0044CC37
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$Release
                                                        • String ID:
                                                        • API String ID: 1035833867-0
                                                        • Opcode ID: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                                        • Instruction ID: 50bf861fd692b93b916a63282857a41227f0dfa19545bc4f0a59f576ae553c11
                                                        • Opcode Fuzzy Hash: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                                        • Instruction Fuzzy Hash: 560184B1641314BFF6009BA1DC4AF1BBB9CEF55755F01842EFF44A7241D6B098008BA9
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(0042A369,057401F8), ref: 0044B66E
                                                        • EnterCriticalSection.KERNEL32(0042A321), ref: 0044B67B
                                                        • TerminateThread.KERNEL32(?,000001F6), ref: 0044B689
                                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B697
                                                          • Part of subcall function 004356CD: CloseHandle.KERNEL32(00000000,0042A365,0044B6A3,0042A365,?,000003E8,?,000001F6), ref: 004356D9
                                                        • InterlockedExchange.KERNEL32(0042A369,000001F6), ref: 0044B6AC
                                                        • LeaveCriticalSection.KERNEL32(0042A321), ref: 0044B6AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                                        • Instruction ID: 3e278a896620ffa5fdfd5bcc44ba61fc9bc9ab212b345b13b81bb6ec37c91fca
                                                        • Opcode Fuzzy Hash: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                                        • Instruction Fuzzy Hash: E3F0F672141206BBD210AB24EE89DBFB37CFF44315F41096AF60142550CB75F811CBBA
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00437127
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00437140
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 00437150
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 00437162
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0043716D
                                                        • CloseHandle.KERNEL32(00000000), ref: 00437174
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                                        • Instruction ID: 38550948ec006cf47bed7574f40cc63f5aae242ba43c895826076912260f23cd
                                                        • Opcode Fuzzy Hash: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                                        • Instruction Fuzzy Hash: 37F054352813117BE6215B109E4EFEF37A8AF49F02F104828FB41B51D0E7E469458BAE
                                                        APIs
                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000008,004A8E80,BC000000,00431B28,C:\Users\user\Desktop\0wxckB4Iba.exe,00000004), ref: 00436055
                                                        • LockServiceDatabase.ADVAPI32(00000000), ref: 00436062
                                                        • UnlockServiceDatabase.ADVAPI32(00000000), ref: 0043606D
                                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00436076
                                                        • GetLastError.KERNEL32 ref: 00436081
                                                        • CloseServiceHandle.ADVAPI32(00000000), ref: 00436091
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Service$CloseDatabaseHandle$ErrorLastLockManagerOpenUnlock
                                                        • String ID:
                                                        • API String ID: 1690418490-0
                                                        • Opcode ID: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                                        • Instruction ID: 156e5f382d75df54ba3c5c30185d6bb62b1a9e6e0194ec4ef6b9e4a62dbea0b3
                                                        • Opcode Fuzzy Hash: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                                        • Instruction Fuzzy Hash: 9BE0E5319821216BC6231B30AE4DBCF3B99DB1F311F041827F701D2250CB998404DBA8
                                                        APIs
                                                          • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                                        • CoInitialize.OLE32(00000000), ref: 00475B71
                                                        • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 00475B8A
                                                        • CoUninitialize.OLE32 ref: 00475D71
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                        • String ID: .lnk$HH
                                                        • API String ID: 886957087-3121654589
                                                        • Opcode ID: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                                        • Instruction ID: f4d7caca580305710a2a5ca379fd8543151c5613ecc12b631d1ff665410dc3a0
                                                        • Opcode Fuzzy Hash: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                                        • Instruction Fuzzy Hash: B0819D75604300AFD310EF65CC82F5AB3A9EF88704F50892DF658AF2D2D6B5E905CB99
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem_memset
                                                        • String ID: 0
                                                        • API String ID: 1173514356-4108050209
                                                        • Opcode ID: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                                        • Instruction ID: b3a4179b3c174fb1a3aa0d908437eb3f68f1f523a6631853a4ee88e897a1c7ed
                                                        • Opcode Fuzzy Hash: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                                        • Instruction Fuzzy Hash: 31418CB55043019BD710CF19C884B5BBBE5AFC5324F148A6EFCA49B282C375E809CBA6
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(?), ref: 00437CB2
                                                        • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00437D26
                                                        • FreeLibrary.KERNEL32(?,?,AU3_GetPluginDetails), ref: 00437D3D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: AU3_GetPluginDetails$Wu
                                                        • API String ID: 145871493-136108093
                                                        • Opcode ID: 86e4c61e32d2ed878dfd7fe720ec64e92d9a8cb9aafa3c38a6749b64446316ec
                                                        • Instruction ID: 909018a8305b4cb0ce841e730e5bf8c258fddf5044228ae68d4d210ccee2088c
                                                        • Opcode Fuzzy Hash: 86e4c61e32d2ed878dfd7fe720ec64e92d9a8cb9aafa3c38a6749b64446316ec
                                                        • Instruction Fuzzy Hash: 054147B96042019FC314DF68D8C4D5AF3E5FF8D304B20866EE9568B751DB35E802CB96
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469368
                                                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00469379
                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 004693AB
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 763830540-1403004172
                                                        • Opcode ID: 7f2c4204b424c93c7ac22b89fbd31dfb367e10b18f94ca1fc21d6a87b04bc3c1
                                                        • Instruction ID: 8c71ebf423f389569590ff88e643f185c263fd61562863516bde62979c95be4e
                                                        • Opcode Fuzzy Hash: 7f2c4204b424c93c7ac22b89fbd31dfb367e10b18f94ca1fc21d6a87b04bc3c1
                                                        • Instruction Fuzzy Hash: E0210C7160020067C210BB3A9C46FAF77989B85364F09052FF959AB3D1EA7CE94A436E
                                                        APIs
                                                        • GetStdHandle.KERNEL32(?), ref: 004439B4
                                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,75572EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                                          • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CurrentHandleProcess$Duplicate
                                                        • String ID: nul
                                                        • API String ID: 2124370227-2873401336
                                                        • Opcode ID: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                                        • Instruction ID: e5202fea31d744cc2812a948a395a4146b23d8233fafbd02014e3d546f800e0b
                                                        • Opcode Fuzzy Hash: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                                        • Instruction Fuzzy Hash: 8921A070104301ABE320DF28D886B9B77E4AF94B24F504E1EF9D4972D1E3B5DA54CBA6
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 004438B7
                                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,75572EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                                          • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                                          • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CurrentHandleProcess$Duplicate
                                                        • String ID: nul
                                                        • API String ID: 2124370227-2873401336
                                                        • Opcode ID: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                                        • Instruction ID: 183321404fa0000a7fb955016a75d3ae5bd0bbc3c7f5d4043dd6f74a8503dfc6
                                                        • Opcode Fuzzy Hash: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                                        • Instruction Fuzzy Hash: 4E2182701002019BE210DF28DC45F9BB7E4AF54B34F204A1EF9E4962D0E7759654CB56
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00441333
                                                        • LoadLibraryW.KERNEL32(?,?,?,?,0047B4D0,?,?,?,?,?,?,?,?,?,00000000), ref: 0044133A
                                                        • SendMessageW.USER32(?,00000467,00000000,?), ref: 00441352
                                                        • DestroyWindow.USER32(00000000,?,00000467,00000000,?,?,?,?,0047B4D0,?,?,?,?,?,?), ref: 0044135B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyLibraryLoadWindow
                                                        • String ID: SysAnimate32
                                                        • API String ID: 3529120543-1011021900
                                                        • Opcode ID: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                                        • Instruction ID: 28effd0bdeb99d0e0a50349a2d6ccdc4655b9339127a2247ff1827a793b197f6
                                                        • Opcode Fuzzy Hash: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                                        • Instruction Fuzzy Hash: D0216271204301ABF7209AA5DC84F6B73ECEBD9724F104A1EF651D72E0D6B4DC818729
                                                        APIs
                                                        • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000001), ref: 0044304E
                                                        • TranslateMessage.USER32(?), ref: 0044308B
                                                        • DispatchMessageW.USER32(?), ref: 00443096
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004430AD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Message$Peek$DispatchTranslate
                                                        • String ID: *.*
                                                        • API String ID: 1795658109-438819550
                                                        • Opcode ID: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                                        • Instruction ID: a39ada88e739a490af96418dc0f35d82e94fc94c1e76e22fe960a83301852fb1
                                                        • Opcode Fuzzy Hash: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                                        • Instruction Fuzzy Hash: 9F2138715183419EF720DF289C80FA3B7949B60B05F008ABFF66492191E6B99608C76E
                                                        APIs
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                          • Part of subcall function 004389A1: SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                                          • Part of subcall function 004389A1: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                                          • Part of subcall function 004389A1: GetCurrentThreadId.KERNEL32 ref: 004389DA
                                                          • Part of subcall function 004389A1: AttachThreadInput.USER32(00000000), ref: 004389E1
                                                        • GetFocus.USER32 ref: 004609EF
                                                          • Part of subcall function 004389EB: GetParent.USER32(?), ref: 004389F7
                                                          • Part of subcall function 004389EB: GetParent.USER32(?), ref: 00438A04
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00460A37
                                                        • EnumChildWindows.USER32(?,00445A31,?), ref: 00460A60
                                                        • __swprintf.LIBCMT ref: 00460A7A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_wcslen
                                                        • String ID: %s%d
                                                        • API String ID: 991886796-1110647743
                                                        • Opcode ID: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                                        • Instruction ID: 20a4aa43144560c0524e92d1094e5dcb4402c89d1d481f65a72662ac57dae138
                                                        • Opcode Fuzzy Hash: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                                        • Instruction Fuzzy Hash: 7521A4712403046BD610FB65DC8AFEFB7ACAF98704F00481FF559A7181EAB8A509877A
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _memset$_sprintf
                                                        • String ID: %02X
                                                        • API String ID: 891462717-436463671
                                                        • Opcode ID: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                                        • Instruction ID: c3235ccac5cd273424cb9b73a8b9e0f10e05fa8943de770f4571b5c3e9b76774
                                                        • Opcode Fuzzy Hash: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                                        • Instruction Fuzzy Hash: 5B11E97225021167D314FA698C93BEE724CAB45704F50453FF541A75C1EF6CB558839E
                                                        APIs
                                                        • _memset.LIBCMT ref: 0042CD00
                                                        • GetOpenFileNameW.COMDLG32 ref: 0042CD51
                                                          • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\0wxckB4Iba.exe,?,C:\Users\user\Desktop\0wxckB4Iba.exe,004A8E80,C:\Users\user\Desktop\0wxckB4Iba.exe,0040F3D2), ref: 0040FFCA
                                                          • Part of subcall function 00410130: SHGetMalloc.SHELL32(00000000), ref: 0041013A
                                                          • Part of subcall function 00410130: SHGetDesktopFolder.SHELL32(?,004A8E80), ref: 00410150
                                                          • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 00410160
                                                          • Part of subcall function 00410130: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410197
                                                          • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 004101AC
                                                          • Part of subcall function 00410020: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 00410037
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: NamePath$Full_wcscpy$DesktopFileFolderFromListMallocOpen_memset
                                                        • String ID: $OH$@OH$X
                                                        • API String ID: 3491138722-1394974532
                                                        • Opcode ID: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                                        • Instruction ID: e3e81f3fa603e1d093c5df9e9287f390c0398a0e5563e0e16fb911f44c5f658a
                                                        • Opcode Fuzzy Hash: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                                        • Instruction Fuzzy Hash: 2111C2B02043405BC311EF19984175FBBE9AFD5308F14882EF68497292D7FD854DCB9A
                                                        APIs
                                                        • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C3DA
                                                        • SetKeyboardState.USER32(00000080), ref: 0044C3ED
                                                        • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C441
                                                        • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C465
                                                        • SendInput.USER32 ref: 0044C509
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: KeyboardMessagePostState$InputSend
                                                        • String ID:
                                                        • API String ID: 3031425849-0
                                                        • Opcode ID: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                                        • Instruction ID: f46f63d78903415e516a46676784f6fcea1caa301ceb581e17347d916cd8316d
                                                        • Opcode Fuzzy Hash: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                                        • Instruction Fuzzy Hash: DB413B715462446FF760AB24D944BBFBB94AF99324F04061FF9D4122C2D37D9908C77A
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32 ref: 004422F0
                                                        • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,?,?), ref: 0044232B
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0044234E
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00442390
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000), ref: 004423C0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Enum$CloseDeleteOpen
                                                        • String ID:
                                                        • API String ID: 2095303065-0
                                                        • Opcode ID: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                                        • Instruction ID: 24d8057b763805d248a02a33893b377b1579bd56aab3fff97e90bb3d062a49ad
                                                        • Opcode Fuzzy Hash: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                                        • Instruction Fuzzy Hash: 0C3150721043056EE210DF94DD84FBF73ECEBC9314F44492EBA9596141D7B8E9098B6A
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C2F4
                                                        • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C31B
                                                        • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C363
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C385
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C392
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String
                                                        • String ID:
                                                        • API String ID: 2832842796-0
                                                        • Opcode ID: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                                        • Instruction ID: eb365ed5c03c4bb3a44f9ddbc5128f2f56e5f8affd5b6ace934fe40af23b551f
                                                        • Opcode Fuzzy Hash: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                                        • Instruction Fuzzy Hash: 00318675240305ABD610DFA1DC85F9BB3A8AF84705F00891DF94497292D7B9E889CB94
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 00447997
                                                        • GetCursorPos.USER32(?), ref: 004479A2
                                                        • ScreenToClient.USER32(?,?), ref: 004479BE
                                                        • WindowFromPoint.USER32(?,?), ref: 004479FF
                                                        • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447A78
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Client$CursorFromPointProcRectScreenWindow
                                                        • String ID:
                                                        • API String ID: 1822080540-0
                                                        • Opcode ID: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                                        • Instruction ID: e9c1e18ea4fcc9a2ad4b32cd349e8b57ec7287094a91df3c43d19f1875151664
                                                        • Opcode Fuzzy Hash: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                                        • Instruction Fuzzy Hash: DE3188742082029BD710CF19D88596FB7A9EBC8714F144A1EF88097291D778EA57CBAA
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00447C1B
                                                        • ScreenToClient.USER32(?,?), ref: 00447C39
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                                        • EndPaint.USER32(?,?), ref: 00447CD1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                        • String ID:
                                                        • API String ID: 659298297-0
                                                        • Opcode ID: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                                        • Instruction ID: 653bb342b0117225c29b14224c0e663a7b864e912777eddc33bb147bcfad3e12
                                                        • Opcode Fuzzy Hash: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                                        • Instruction Fuzzy Hash: 8A3150706043019FE320CF15D9C8F7B7BE8EB89724F044A6EF994873A1D774A8468B69
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 004478A7
                                                        • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478C3
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,004A83D8,?,004A83D8,?), ref: 004478E7
                                                        • GetCursorPos.USER32(?), ref: 00447935
                                                        • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 0044795B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CursorMenuPopupTrack$Proc
                                                        • String ID:
                                                        • API String ID: 1300944170-0
                                                        • Opcode ID: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                                        • Instruction ID: 600148c7f6f0e64f7aba5c2d0a58757112576a5c49d56a392ea253be37485a5b
                                                        • Opcode Fuzzy Hash: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                                        • Instruction Fuzzy Hash: 2B31E475244204ABE214DB48DC48FABB7A5FBC9711F14491EF64483390D7B96C4BC779
                                                        APIs
                                                        • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                        • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                        • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                        • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                          • Part of subcall function 004413F0: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                                          • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                                          • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                                          • Part of subcall function 004413F0: SendMessageW.USER32(00BC1A68,000000F1,00000000,00000000), ref: 004414C6
                                                          • Part of subcall function 004413F0: SendMessageW.USER32(00BC1A68,000000F1,00000001,00000000), ref: 004414F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$EnableMessageSend$LongShow
                                                        • String ID:
                                                        • API String ID: 142311417-0
                                                        • Opcode ID: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                                        • Instruction ID: 53ead31d82dc60d0a1ec6489c26700cf05fac79e8a5bf65a12bf69c5108a1aee
                                                        • Opcode Fuzzy Hash: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                                        • Instruction Fuzzy Hash: 942105B07053809BF7148E28C8C47AFB7D0FB95345F08482EF981A6391DBAC9845C72E
                                                        APIs
                                                        • _memset.LIBCMT ref: 0044955A
                                                          • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                                        • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 004495B3
                                                        • _wcslen.LIBCMT ref: 004495C1
                                                        • _wcslen.LIBCMT ref: 004495CE
                                                        • SendMessageW.USER32(?,00001060,00000000,?), ref: 004495FF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen$_memset_wcspbrk
                                                        • String ID:
                                                        • API String ID: 1843234404-0
                                                        • Opcode ID: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                                        • Instruction ID: 2eba0e6ca7bf2f01d6f4dc0284c8cedbdf4c7ea0b5caad0642d64795040b3bc6
                                                        • Opcode Fuzzy Hash: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                                        • Instruction Fuzzy Hash: 1821F87260430556E630EB15AC81BFBB3D8EBD0761F10483FEE4081280E67E9959D3AA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                                        • Instruction ID: 4734ce3ce40af5b77ad59fd8baedf6a3e56741e39cc50bb30d89ac3ca2d3bd52
                                                        • Opcode Fuzzy Hash: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                                        • Instruction Fuzzy Hash: 1321E0712006409BCB10EF29D994D6B73A8EF45321B40466EFE5597382DB34EC08CBA9
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00445721
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0044573C
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00445773
                                                        • _wcslen.LIBCMT ref: 004457A3
                                                        • CharUpperBuffW.USER32(00000000,00000000), ref: 004457AD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                        • String ID:
                                                        • API String ID: 3087257052-0
                                                        • Opcode ID: 707967777abbcb615846d4014dd15678eb91240126a64b2d293a4799175c36b7
                                                        • Instruction ID: 00e09c3d40749c53521e9302b0eb92bb7bfe2d7d521d01ead8474e6f611d5aec
                                                        • Opcode Fuzzy Hash: 707967777abbcb615846d4014dd15678eb91240126a64b2d293a4799175c36b7
                                                        • Instruction Fuzzy Hash: FA11E972601741BBF7105B35DC46F5B77CDAF65320F04443AF40AE6281FB69E84583AA
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00459DEF
                                                        • GetForegroundWindow.USER32 ref: 00459E07
                                                        • GetDC.USER32(00000000), ref: 00459E44
                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 00459E4F
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00459E8B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                                        • Instruction ID: f25aa70a507d7fb142791e963b89e5313ab4350e7ab13503248c443e15a863bf
                                                        • Opcode Fuzzy Hash: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                                        • Instruction Fuzzy Hash: 76219D76600202ABD700EFA5CD49A5AB7E9FF84315F19483DF90597642DB78FC04CBA9
                                                        APIs
                                                          • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                                        • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 00464985
                                                        • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,00000000), ref: 00464993
                                                        • connect.WSOCK32(00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649CD
                                                        • WSAGetLastError.WSOCK32(00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649F4
                                                        • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 00464A07
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 245547762-0
                                                        • Opcode ID: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
                                                        • Instruction ID: b27d5ee258410aac5bd3077dd9c53ce90635b59006b610d0ec7ee295a05cd03d
                                                        • Opcode Fuzzy Hash: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
                                                        • Instruction Fuzzy Hash: 3211DA712002109BD310FB2AC842F9BB3D8AF85728F04895FF594A72D2D7B9A885875A
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00447151
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                        • SelectObject.GDI32(?,00000000), ref: 004471A2
                                                        • BeginPath.GDI32(?), ref: 004471B7
                                                        • SelectObject.GDI32(?,00000000), ref: 004471DC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Object$Select$BeginCreateDeletePath
                                                        • String ID:
                                                        • API String ID: 2338827641-0
                                                        • Opcode ID: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                                        • Instruction ID: ab30216038401830d00444c504d41f25dcbf82a6e2307e0a418987ed8484b610
                                                        • Opcode Fuzzy Hash: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                                        • Instruction Fuzzy Hash: 7E2171B18083019FD320CF29AD44A1B7FACF74A724F14052FF654933A1EB789849CB69
                                                        APIs
                                                        • Sleep.KERNEL32(00000000,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043771E
                                                        • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043773C
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043775C
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,004448B6,0000000F,?), ref: 00437767
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CounterPerformanceQuerySleep
                                                        • String ID:
                                                        • API String ID: 2875609808-0
                                                        • Opcode ID: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                                        • Instruction ID: fd8a8a83491f03de43ea78fbc63302b75a2fa5438857304713168bbc83ca9150
                                                        • Opcode Fuzzy Hash: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                                        • Instruction Fuzzy Hash: EA11A3B64093119BC210EF1ADA88A8FB7F4FFD8765F004D2EF9C462250DB34D5598B9A
                                                        APIs
                                                        • SendMessageW.USER32 ref: 0046FD00
                                                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 0046FD2E
                                                        • SendMessageW.USER32(?,00001015,?,?), ref: 0046FD4B
                                                        • DestroyIcon.USER32(?), ref: 0046FD58
                                                        • DestroyIcon.USER32(?), ref: 0046FD5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyIcon
                                                        • String ID:
                                                        • API String ID: 3419509030-0
                                                        • Opcode ID: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                                        • Instruction ID: ba7c1cc62690e465ab1dcb48fa3e0f79152c3dc78d34179caeeeb49ed344ab69
                                                        • Opcode Fuzzy Hash: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                                        • Instruction Fuzzy Hash: 5F1182B15043449BE730DF14DC46BABB7E8FBC5714F00492EE6C857291D6B8A84A8B67
                                                        APIs
                                                        • __getptd.LIBCMT ref: 004175AE
                                                          • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                                          • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                                        • __amsg_exit.LIBCMT ref: 004175CE
                                                        • __lock.LIBCMT ref: 004175DE
                                                        • InterlockedDecrement.KERNEL32(?), ref: 004175FB
                                                        • InterlockedIncrement.KERNEL32(00BC2D00), ref: 00417626
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                        • String ID:
                                                        • API String ID: 4271482742-0
                                                        • Opcode ID: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                                        • Instruction ID: de548182bd5f57d4f8c9f8a4c79293bfa6802d75d0085d2526eaa3c6a777046b
                                                        • Opcode Fuzzy Hash: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                                        • Instruction Fuzzy Hash: 9401AD31944A11AFC710ABA998497CE7BB0BB11724F0540ABE80063791CB3CA9C1CFEE
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteObjectWindow$Icon
                                                        • String ID:
                                                        • API String ID: 4023252218-0
                                                        • Opcode ID: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                                        • Instruction ID: d1816f9fa450f538fb043821254e2bd2cfb9ade9207d957631f6d0e9d50691b6
                                                        • Opcode Fuzzy Hash: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                                        • Instruction Fuzzy Hash: 05015E70300605ABCB20DF65D9D4B2B77A8BF14712B50452AFD04D7346EB38EC48CB69
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00460342
                                                        • GetWindowTextW.USER32(00000000,00000100,00000100), ref: 00460357
                                                        • MessageBeep.USER32(00000000), ref: 0046036D
                                                        • KillTimer.USER32(?,0000040A), ref: 00460392
                                                        • EndDialog.USER32(?,00000001), ref: 004603AB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                                        • Instruction ID: 48c257e0c270193328064fa19c5b46d6a870d8092b70dfec968bdaebd9a60f08
                                                        • Opcode Fuzzy Hash: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                                        • Instruction Fuzzy Hash: BE018831500300A7E7209B54DE5DBDB77A8BF44B05F00492EB681A25D0E7F8A584CB55
                                                        APIs
                                                        • SendMessageW.USER32(?,00001101,00000000,?), ref: 00455514
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                        • String ID:
                                                        • API String ID: 1489400265-0
                                                        • Opcode ID: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                                        • Instruction ID: 68d82c845863845e83b9d92669df32d5d1b96a6c2c0272d07869f65424c05900
                                                        • Opcode Fuzzy Hash: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                                        • Instruction Fuzzy Hash: D9014F703006419BDB10EF65DED8A2A73A9FB44712B40455AFE05DB286DB78EC49CB68
                                                        APIs
                                                          • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                        • String ID:
                                                        • API String ID: 1042038666-0
                                                        • Opcode ID: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                                        • Instruction ID: 707d1f3050e1f0ff98422ce5efa9f9a4d3559fdafbc0a23101ed238e91bf2869
                                                        • Opcode Fuzzy Hash: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                                        • Instruction Fuzzy Hash: B2014B702006419BCB10AF65D9C8A2A33ACAF19322780456AFD05D7242DB28EC498B79
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                                        • Instruction ID: 1b0d13c7bbaa275692c81ef4a4760df4fcf6218f807946f7e03cce85d1463269
                                                        • Opcode Fuzzy Hash: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                                        • Instruction Fuzzy Hash: F7F0A4751052019BD7508F18EC0C70E7FA8FB4F325F04462EEA19932E0DB781546CBAD
                                                        APIs
                                                          • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                                        • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                        • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                        • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                                        • ExitThread.KERNEL32 ref: 0041410F
                                                        • GetCurrentThreadId.KERNEL32 ref: 00414115
                                                        • __freefls@4.LIBCMT ref: 00414135
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                        • String ID:
                                                        • API String ID: 132634196-0
                                                        • Opcode ID: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                                        • Instruction ID: c6f54ac6c47f72d6c6be617d0ab0d95393642b3a08ca47198428750b18cc63fb
                                                        • Opcode Fuzzy Hash: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                                        • Instruction Fuzzy Hash: EFE0B6318012096B8F0177F28E2A8DF3A2DAD56799B12842EBF10A3112DA6DD9D147AD
                                                        APIs
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00415610
                                                          • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                                        • __getptd_noexit.LIBCMT ref: 00415620
                                                        • CloseHandle.KERNEL32(?,?,0041566B), ref: 00415634
                                                        • __freeptd.LIBCMT ref: 0041563B
                                                        • ExitThread.KERNEL32 ref: 00415643
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentExitFindHandleImageNonwritableSectionThread__freeptd__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 3798957060-0
                                                        • Opcode ID: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                                        • Instruction ID: 5ad9b57b40d8b41da6f03c32f2a15b2799e0bbfe2e5ad1689210a27a588f1b2a
                                                        • Opcode Fuzzy Hash: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                                        • Instruction Fuzzy Hash: 29E01A31501A1197C2212BB9AC097DE3255AF01F36F944A6EF81A952A0DB6CD98147AD
                                                        APIs
                                                          • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                                        • ___set_flsgetvalue.LIBCMT ref: 00415690
                                                          • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                          • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                          • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                        • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                                          • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                        • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                                          • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                                        • ExitThread.KERNEL32 ref: 004156BD
                                                        • __freefls@4.LIBCMT ref: 004156D9
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                        • String ID:
                                                        • API String ID: 1537469427-0
                                                        • Opcode ID: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                                        • Instruction ID: 6f4b581ce684dac4bce1a6396b1ab204a3b2196504341234b7a244e47b3a25b0
                                                        • Opcode Fuzzy Hash: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                                        • Instruction Fuzzy Hash: 83E0E6308003096BCF0037F29E1A9DF392DAD41389B52841E7E14B2122DE6DD9D1466D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _malloc
                                                        • String ID: Default$|k
                                                        • API String ID: 1579825452-2254895183
                                                        • Opcode ID: 3487a4ebd3b6326aef9d7885c20b94cf9b3333ebd549fd878091b2165ba8d13b
                                                        • Instruction ID: 39a525bc613f0e7e9485e4ea944b13d532e73913c0a35fc25f8fa2b96209a7b9
                                                        • Opcode Fuzzy Hash: 3487a4ebd3b6326aef9d7885c20b94cf9b3333ebd549fd878091b2165ba8d13b
                                                        • Instruction Fuzzy Hash: 51F19F706083018BD714DF25C484A6BB7E5AF85314F64886FF885AB392D738EC55CB9B
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID: '$[$h
                                                        • API String ID: 2931989736-1224472061
                                                        • Opcode ID: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
                                                        • Instruction ID: c2eec353cbd26a418970a1643da97c958d9efd09d44d369c5aec2a2e92b02032
                                                        • Opcode Fuzzy Hash: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
                                                        • Instruction Fuzzy Hash: EBE1B3756083858FE725CF28C8807ABBBE1FFC9304F18896EE89587341D7799849CB56
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _strncmp
                                                        • String ID: >$R$U
                                                        • API String ID: 909875538-1924298640
                                                        • Opcode ID: f9ebc198af2ab7ab0819517e001d9756788144751dce64bc403378e3fae079f3
                                                        • Instruction ID: f6794502b7c89560a677b30a08de70cb8bc1b17d125f16f135907c58c8460d8d
                                                        • Opcode Fuzzy Hash: f9ebc198af2ab7ab0819517e001d9756788144751dce64bc403378e3fae079f3
                                                        • Instruction Fuzzy Hash: 46E19C745083818FEB25CF29C49076BBBE1EFD9304F28496EE89587381D378E849CB56
                                                        APIs
                                                          • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                                        • CoInitialize.OLE32(00000000), ref: 0046CE18
                                                        • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 0046CE31
                                                        • CoUninitialize.OLE32 ref: 0046CE50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 886957087-24824748
                                                        • Opcode ID: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                                        • Instruction ID: 09ec1e36491b9dee8eccbfa157b0fc1a83632a56aae6c10d58f94140378ad3aa
                                                        • Opcode Fuzzy Hash: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                                        • Instruction Fuzzy Hash: D3A1ABB5A042019FC704EF64C980E6BB7E9EF88714F14895EF8849B392D735EC45CBA6
                                                        Strings
                                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00469C37
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                        • API String ID: 176396367-557222456
                                                        • Opcode ID: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                                        • Instruction ID: 5ec49088f7a0f5eff408c40ec761cfb1cab3d77d8e9f1d748350f88cc39ab646
                                                        • Opcode Fuzzy Hash: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                                        • Instruction Fuzzy Hash: 2C818F715183009FC310EF65C88186BB7E8AF85714F408A2FF5959B2A2E778ED45CB9B
                                                        APIs
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • VariantInit.OLEAUT32(00000000), ref: 0042D2E0
                                                        • VariantCopy.OLEAUT32(?,?), ref: 0042D2EE
                                                        • VariantClear.OLEAUT32(00000000), ref: 0042D2FF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCopyInit_malloc
                                                        • String ID: 4RH
                                                        • API String ID: 2981388473-749298218
                                                        • Opcode ID: 886d72268d4c4b31cd7e9b97dec5c8ab100e14167db6bca7b584ef53709687b2
                                                        • Instruction ID: 2430bd0654d197d786bc988f6f01769df72c779a088326c60667d263ff95ce9f
                                                        • Opcode Fuzzy Hash: 886d72268d4c4b31cd7e9b97dec5c8ab100e14167db6bca7b584ef53709687b2
                                                        • Instruction Fuzzy Hash: CC913874A083519FC720CF29D480A1AB7E1FF89304F64892EE999DB351D774EC85CB96
                                                        APIs
                                                          • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                          • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                        • __wcsnicmp.LIBCMT ref: 0046681A
                                                        • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 004668B9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                        • String ID: LPT$HH
                                                        • API String ID: 3035604524-2728063697
                                                        • Opcode ID: 2945cb5b31277d8c8021d55f3d7ec86f9f5d8a101f6134c00f702d091f19bef7
                                                        • Instruction ID: 32c7950bcbaa764ae6d62266904c1b9f72d26d84b6ae022b5f72856ccecd4d84
                                                        • Opcode Fuzzy Hash: 2945cb5b31277d8c8021d55f3d7ec86f9f5d8a101f6134c00f702d091f19bef7
                                                        • Instruction Fuzzy Hash: 2151D5B16043009FC720EF65C881B1BB7E5AF85704F11491EFA859B382E779ED49C79A
                                                        APIs
                                                          • Part of subcall function 004374AF: WriteProcessMemory.KERNEL32(?,?,00000000,00000000,00000000,?,00461142,?), ref: 004374E2
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00438AB8
                                                          • Part of subcall function 00437472: ReadProcessMemory.KERNEL32(?,00000000,00000000,?,00000000,00000000,00460C33,?,00000000,?,00000202), ref: 004374A5
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00438B2F
                                                        • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 00438BAF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MemoryProcess$ReadWrite
                                                        • String ID: @
                                                        • API String ID: 4055202900-2766056989
                                                        • Opcode ID: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                                        • Instruction ID: 682097a2b5231093ce935cfc9f6f49684b756042c0be5430c67da702d62f7190
                                                        • Opcode Fuzzy Hash: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                                        • Instruction Fuzzy Hash: E6518FB2208304ABD310DB64CC81FEFB7A9EFC9714F04591EFA8597181D678F9498B66
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_memset_wcslen
                                                        • String ID: |
                                                        • API String ID: 915713708-2343686810
                                                        • Opcode ID: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                                        • Instruction ID: 59fb16093b155e5aebf0565036b17e76eaaa1a90c891d08183ce313382d628e9
                                                        • Opcode Fuzzy Hash: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                                        • Instruction Fuzzy Hash: AE417EB2754301ABD204EF69DC81B9BF7E8FB88714F00052EF64593290DB75E909CBA6
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A7FE
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A851
                                                        • HttpQueryInfoW.WININET ref: 0044A892
                                                          • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 3705125965-3916222277
                                                        • Opcode ID: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                                        • Instruction ID: e2ea4e726a01332d61d4ddbc0b4be6fd5f15ca60b5c099a75bcf819f780d651a
                                                        • Opcode Fuzzy Hash: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                                        • Instruction Fuzzy Hash: F431C6B56813416BE320EB16DC42F9FB7E8EFD9714F00091FF65057281D7A8A50D876A
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00450A84
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00450AA2
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00450AB3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                                        • Instruction ID: 1ec52148e0427fd314aa46f8515fbaae5756f8dde681787cc4d1a4a364837cef
                                                        • Opcode Fuzzy Hash: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                                        • Instruction Fuzzy Hash: 9831E670244301AFE710DB64CC84B6BB3E8EF98325F104A1EF9A5932D1D7B8AD85CB25
                                                        APIs
                                                        • DestroyWindow.USER32(00000000,004A83D8,00000000,?,?), ref: 00450C60
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 3375834691-2298589950
                                                        • Opcode ID: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                                        • Instruction ID: 6a1e1189e42626fde14bc74b9d87f1f450c181bb0fe7a510af516aef360d3f61
                                                        • Opcode Fuzzy Hash: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                                        • Instruction Fuzzy Hash: CE31A279300201AFD624DF54DC81F5B73A9EB9A714F20451EF640AB382C7B4AC4ACB6A
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 0045122A
                                                        • SendMessageW.USER32(00000000,00000186,00000000,00000000), ref: 00451238
                                                        • MoveWindow.USER32(?,?,00000000,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 0045125D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                                        • Instruction ID: bfe1e9b3800f224edd0053b2d0d87a77da448e7bf5b17050dc61905274d7532a
                                                        • Opcode Fuzzy Hash: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                                        • Instruction Fuzzy Hash: E421D3712043047BE6209A65DC81F6BB3E8EBCD735F104B1EFA60A72D1C675EC458729
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D243
                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D2C7
                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D30C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume
                                                        • String ID: HH
                                                        • API String ID: 2507767853-2761332787
                                                        • Opcode ID: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                                        • Instruction ID: 4a708fd112bc3492f79fb502a293ca5b83a6a9b53d4ab80d782c21126568c1ab
                                                        • Opcode Fuzzy Hash: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                                        • Instruction Fuzzy Hash: 622148756083019FC310EF55D944A6BB7E4FF88704F40882EFA45972A2D774E909CB5A
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D44A
                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CE
                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D502
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume
                                                        • String ID: HH
                                                        • API String ID: 2507767853-2761332787
                                                        • Opcode ID: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                                        • Instruction ID: 8e4373afe1f51974a95c06a3ae407364d3098df30383bdf5f9e51316f0e0b5c8
                                                        • Opcode Fuzzy Hash: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                                        • Instruction Fuzzy Hash: 902137756083019FC314EF55D944A5AB7E8FF88710F40882EFA49972A2D778E909CB9A
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450D74
                                                        • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450D8A
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450D98
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                                        • Instruction ID: c83169f0c5ec68c29a3e9aa847b4a28030a04f73c00385235601d1c9d4ce90e2
                                                        • Opcode Fuzzy Hash: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                                        • Instruction Fuzzy Hash: 4F1193717403117BE610CAA8DC81F5B73E8AB98B25F204A1AFA50A72C1D2B4FC458B68
                                                        APIs
                                                          • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                                        • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046BD78
                                                        • WSAGetLastError.WSOCK32(00000000,?,?,00000000,?,?), ref: 0046BD83
                                                        • inet_ntoa.WSOCK32(00000000,?), ref: 0046BDCD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ByteCharErrorLastMultiWidegethostbynameinet_ntoa
                                                        • String ID: HH
                                                        • API String ID: 1515696956-2761332787
                                                        • Opcode ID: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
                                                        • Instruction ID: 2fad99cf3c45da3a785a9a513efbde0c8943f1fdc9598a344110207fd9df59bd
                                                        • Opcode Fuzzy Hash: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
                                                        • Instruction Fuzzy Hash: E21142765043006BC744FB66D885D9FB3A8AFC4318F448C2EF945A7242DA39E949876A
                                                        APIs
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • GetMenuItemInfoW.USER32 ref: 004497EA
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00449817
                                                        • DrawMenuBar.USER32 ref: 00449828
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Menu$InfoItem$Draw_malloc
                                                        • String ID: 0
                                                        • API String ID: 772068139-4108050209
                                                        • Opcode ID: aba2b2f37e8aede0e07af882035f7c7ba327ed0a8d43e4983355c33413849c0f
                                                        • Instruction ID: 895394c4ac3d8cdb9511dba433443d5742fa96e32f07ab63668b9f5a94eb31d1
                                                        • Opcode Fuzzy Hash: aba2b2f37e8aede0e07af882035f7c7ba327ed0a8d43e4983355c33413849c0f
                                                        • Instruction Fuzzy Hash: 941182B16042009BF730EB55EC96FABB7A8FB91714F00452EE648CA281DB7A9445CB76
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AllocTask_wcslen
                                                        • String ID: hkG
                                                        • API String ID: 2651040394-3610518997
                                                        • Opcode ID: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                                        • Instruction ID: 372044899b15e8c53ead78f1c779643819f92c4817f04f111663958edd7e2adf
                                                        • Opcode Fuzzy Hash: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                                        • Instruction Fuzzy Hash: DCE065736442225B97506A79AC045CBA7D8AFB0370B15482BF880E7310E278E89643E5
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0043417A
                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0043418C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                        • API String ID: 2574300362-1816364905
                                                        • Opcode ID: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                                        • Instruction ID: 1a9860a365f0c849ce8c10f1c40c5c80f9dda93506fd3415c38c98a37cde1a5a
                                                        • Opcode Fuzzy Hash: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                                        • Instruction Fuzzy Hash: F9D05EB1440B039FCB109FA0D80C64BB6E4AB64301F148C2EF885B2654D7B8E8C0CBA8
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434466,?,?,00464B68,?,?,?,?,?,00000000,?,?,00000101,?), ref: 004343DE
                                                        • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004343F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: ICMP.DLL$IcmpSendEcho
                                                        • API String ID: 2574300362-58917771
                                                        • Opcode ID: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                                        • Instruction ID: bde82dd314f67bb94adb8237e566b22d9cd50c1f3059090bebd97951f1ce1dc3
                                                        • Opcode Fuzzy Hash: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                                        • Instruction Fuzzy Hash: C9D017B45043039BD7105B21D80874A76E4AF58310F118C2FF881E2250CBBCE8808B79
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(ICMP.DLL,?,0043447D,?,?,00464B56,?,?,?,?,00000000,?,?,00000101,?,?), ref: 0043440D
                                                        • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 0043441F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: ICMP.DLL$IcmpCloseHandle
                                                        • API String ID: 2574300362-3530519716
                                                        • Opcode ID: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                                        • Instruction ID: 815a2f2ef77883dfca24b23846b24e776c3b140ddfaf16f0983d17b56328066b
                                                        • Opcode Fuzzy Hash: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                                        • Instruction Fuzzy Hash: 9FD017B04443129AD7106B64D80874A76E4AB68302F129C3FF881A2660C7BCA8808B39
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434494,?,?,00464A94,?), ref: 0043443C
                                                        • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 0043444E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: ICMP.DLL$IcmpCreateFile
                                                        • API String ID: 2574300362-275556492
                                                        • Opcode ID: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                                        • Instruction ID: c247b13c068300da1972229949477068df6ba5342f41feac8fae2a533bc96115
                                                        • Opcode Fuzzy Hash: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                                        • Instruction Fuzzy Hash: 97D017B04043029ADB105B60D90875A77E4AB68300F118C7FF9A1A2250C7BCA8808B29
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: c8a8680659340ce3ae7b61d15611f915275d61821cdaab737acf418eefb31e18
                                                        • Instruction ID: 4e1e522645e86f73b8885f2d86dba7d443b77ce6b8f7ad4508257b27d10f8221
                                                        • Opcode Fuzzy Hash: c8a8680659340ce3ae7b61d15611f915275d61821cdaab737acf418eefb31e18
                                                        • Instruction Fuzzy Hash: 3DD18D746003018FD724DF25D484A26B7E1EF49704F64887EE9899B3A1D739EC92CB9A
                                                        APIs
                                                        • __flush.LIBCMT ref: 00414630
                                                        • __fileno.LIBCMT ref: 00414650
                                                        • __locking.LIBCMT ref: 00414657
                                                        • __flsbuf.LIBCMT ref: 00414682
                                                          • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                          • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                                        • String ID:
                                                        • API String ID: 3240763771-0
                                                        • Opcode ID: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                                        • Instruction ID: ec1a4dff6c5341ad57a53ba98b0f539b864df2cc4a0ba96fecd891c5d8a4160d
                                                        • Opcode Fuzzy Hash: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                                        • Instruction Fuzzy Hash: 4841A571A00605ABDB249FA5C9445DFB7B6EFC1328F28852FE41997280D77CDEC18B48
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                        • VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                        • VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CopyVariant$ErrorLast
                                                        • String ID:
                                                        • API String ID: 2286883814-0
                                                        • Opcode ID: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                                        • Instruction ID: 2d87100fc18953c9afe9b7e879878e48daa4ef19e0256d9a4550ae3fa38499cf
                                                        • Opcode Fuzzy Hash: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                                        • Instruction Fuzzy Hash: 5F517C751543409FC310DF69C880A9BBBE4FF88314F448A6EF9499B352DB39E909CB99
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00474068
                                                        • WSAGetLastError.WSOCK32(00000000,00000002,00000002,00000011), ref: 00474076
                                                        • #21.WSOCK32 ref: 004740E0
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 004740EB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$socket
                                                        • String ID:
                                                        • API String ID: 1881357543-0
                                                        • Opcode ID: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
                                                        • Instruction ID: ff1742a21ceaee7448286ece46cbaad1fa76dded649dcd1b12ff87c083dae87e
                                                        • Opcode Fuzzy Hash: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
                                                        • Instruction Fuzzy Hash: 7641D9717403006AE720BF6ADC47F5672C89B54B18F14496EF648BF2C3D6FAA881869C
                                                        APIs
                                                        • ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                                        • GetWindowRect.USER32(?,?), ref: 00441D5A
                                                        • PtInRect.USER32(?,?,?), ref: 00441D6F
                                                        • MessageBeep.USER32(00000000), ref: 00441DF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                                        • Instruction ID: 11ad13a84751b34e4f8a983c71a6a29643224e7bbeba0240db3aabd8edeb2108
                                                        • Opcode Fuzzy Hash: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                                        • Instruction Fuzzy Hash: E64192B5A042418FE710DF18D884AABB7E5FFC9311F18866FE8518B360D734AC85CBA5
                                                        APIs
                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042387E
                                                        • __isleadbyte_l.LIBCMT ref: 004238B2
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,00000002,?,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 004238E3
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,00000002,00000001,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 00423951
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                        • String ID:
                                                        • API String ID: 3058430110-0
                                                        • Opcode ID: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                                        • Instruction ID: 550681b3841f0f34ee613cb5364b25607849a03987ccfca5eaaec14299199b49
                                                        • Opcode Fuzzy Hash: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                                        • Instruction Fuzzy Hash: A931C270B00265EFDB20EF64D8849AA7BF5EF01312B9445AAF0A09F291D338CE81CB55
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D10A
                                                        • GetLastError.KERNEL32(?,00000000), ref: 0045D12B
                                                        • DeleteFileW.KERNEL32(00000000,?), ref: 0045D14C
                                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0045D16A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                                        • Instruction ID: 240381fd0e223f31e6bb83dc4f900fe278965bce5f9bbaa9f824fb1079ab41c9
                                                        • Opcode Fuzzy Hash: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                                        • Instruction Fuzzy Hash: 393180B5900301ABCB10AF71C985A1BF7E8AF84755F10891EF85497392C739FC45CB68
                                                        APIs
                                                        • GetParent.USER32(?), ref: 004505BF
                                                        • DefDlgProcW.USER32(?,00000138,?,?,004A83D8,?,004A83D8,?), ref: 00450610
                                                        • DefDlgProcW.USER32(?,00000133,?,?,004A83D8,?,004A83D8,?), ref: 0045065A
                                                        • DefDlgProcW.USER32(?,00000134,?,?,004A83D8,?,004A83D8,?), ref: 00450688
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Proc$Parent
                                                        • String ID:
                                                        • API String ID: 2351499541-0
                                                        • Opcode ID: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                                        • Instruction ID: e3e31f905615dd8bfbe674c7a91f48f64006a8638b4dc9b760805e547d05c650
                                                        • Opcode Fuzzy Hash: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                                        • Instruction Fuzzy Hash: 8C3128362411006BC2209B299C58DBB7B58EBC7336F14465BFA54832D3CB769826C768
                                                        APIs
                                                          • Part of subcall function 00438C85: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00438C95
                                                          • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                        • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 00461420
                                                        • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 0046144F
                                                        • __itow.LIBCMT ref: 00461461
                                                        • __itow.LIBCMT ref: 004614AB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$__itow$_wcslen
                                                        • String ID:
                                                        • API String ID: 2875217250-0
                                                        • Opcode ID: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                                        • Instruction ID: b65c482f8247f617b799fd724a7506577ebf884cdb52d0d4602b18db992df379
                                                        • Opcode Fuzzy Hash: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                                        • Instruction Fuzzy Hash: 3A213D7670031067D210BA169C86FAFB794EB94714F08443FFF44AB241EE69E94687EB
                                                        APIs
                                                        • _memset.LIBCMT ref: 0040E202
                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell__memset
                                                        • String ID:
                                                        • API String ID: 928536360-0
                                                        • Opcode ID: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                                                        • Instruction ID: 9c6d99eda8392314e00a4319cd3b9f491a6d528882fc0aac3328a2d60ab56ec1
                                                        • Opcode Fuzzy Hash: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                                                        • Instruction Fuzzy Hash: FC318170608701DFD320DF25D845B97BBF8BB45304F00486EE99A93380E778A958CF5A
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 00472806
                                                          • Part of subcall function 00443EEF: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 00443F11
                                                          • Part of subcall function 00443EEF: GetCurrentThreadId.KERNEL32 ref: 00443F18
                                                          • Part of subcall function 00443EEF: AttachThreadInput.USER32(00000000), ref: 00443F1F
                                                        • GetCaretPos.USER32(?), ref: 0047281A
                                                        • ClientToScreen.USER32(00000000,?), ref: 00472856
                                                        • GetForegroundWindow.USER32 ref: 0047285C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                                        • Instruction ID: 38f02bd9b1f6bed34cfa7ce2d7f69328ba3456287a0ba45db7850a86b8391dd2
                                                        • Opcode Fuzzy Hash: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                                        • Instruction Fuzzy Hash: FF2195716403056FE310EF65CC42F5BB7E8AF84708F144D2EF544AB282D6FAB9858795
                                                        APIs
                                                          • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0047728E
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772A9
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772C0
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772D0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$AttributesLayered
                                                        • String ID:
                                                        • API String ID: 2169480361-0
                                                        • Opcode ID: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                                        • Instruction ID: faea1ea985e506ac999786301d765d91882fdca708237d94abe4bce3661c65f1
                                                        • Opcode Fuzzy Hash: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                                        • Instruction Fuzzy Hash: 5F11B431205510ABD310FB29DD45F9BB798FF91720F10862EF455E72E2C7A8AC45C7A8
                                                        APIs
                                                        • SendMessageW.USER32 ref: 00448CB8
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00448CE0
                                                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448D19
                                                        • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow
                                                        • String ID:
                                                        • API String ID: 312131281-0
                                                        • Opcode ID: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                                        • Instruction ID: 9d6bf2a2f0cb0d5184a29e15ea511504db1ac53b4253ca88fa0f688086887250
                                                        • Opcode Fuzzy Hash: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                                        • Instruction Fuzzy Hash: B12174715053019BF3208F18D98879FB7E4FBD5325F140B2EF594962D0DBB58449C796
                                                        APIs
                                                        • select.WSOCK32 ref: 0045890A
                                                        • __WSAFDIsSet.WSOCK32(00000000,00000000), ref: 00458919
                                                        • accept.WSOCK32(00000000,00000000,00000000,00000000,00000000), ref: 00458927
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00458952
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastacceptselect
                                                        • String ID:
                                                        • API String ID: 385091864-0
                                                        • Opcode ID: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
                                                        • Instruction ID: 93f38c3b8a65fd8a68e5265ae944391143789c71a4918893f245a539b4228a7d
                                                        • Opcode Fuzzy Hash: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
                                                        • Instruction Fuzzy Hash: 1F2166712043019BD314EF29C842BABB7E5AFC4714F144A2EF994DB2C1DBB4A985CB99
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00438D6F
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D82
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D9A
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438DB4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                                        • Instruction ID: 707762f1bc06eebb59e9357f9c77b20c0e090dcf7cedc03b298b4f863176c0ea
                                                        • Opcode Fuzzy Hash: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                                        • Instruction Fuzzy Hash: 77113AB6204305AFD210EF58DC84F6BF7E8EBE8750F20491EF580D7290D6B1A8468BA1
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,FFFFFFFF,?,?,?,?,?,?,00400000,00000000), ref: 0043367E
                                                        • GetStockObject.GDI32(00000011), ref: 00433695
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 0043369F
                                                        • ShowWindow.USER32(00000000,00000000), ref: 004336BA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateMessageObjectSendShowStock
                                                        • String ID:
                                                        • API String ID: 1358664141-0
                                                        • Opcode ID: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                                        • Instruction ID: 5bb77caae3378c1c36de35f78993aeb7f53e4fc0e9047450929301c31466c70f
                                                        • Opcode Fuzzy Hash: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                                        • Instruction Fuzzy Hash: 60114F72204A00BFD254DF55CC49F5BB3F9AFCCB01F20950DB254922A0D7B4E9418BA9
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 004441B8
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 004441F6
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0044420C
                                                        • CloseHandle.KERNEL32(00000000), ref: 00444213
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                        • String ID:
                                                        • API String ID: 2880819207-0
                                                        • Opcode ID: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                                        • Instruction ID: a177bb78e812b0c83f085b16f259857c8a511f23e32e5024349264f8b0df3d09
                                                        • Opcode Fuzzy Hash: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                                        • Instruction Fuzzy Hash: C401E5364183105BD300DB28ED08A9BBBD8BFD9721F18067EF89893351E6B48948C7B6
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00434037
                                                        • ScreenToClient.USER32(?,?), ref: 0043405B
                                                        • ScreenToClient.USER32(?,?), ref: 00434085
                                                        • InvalidateRect.USER32(?,?,?), ref: 004340A4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ClientRectScreen$InvalidateWindow
                                                        • String ID:
                                                        • API String ID: 357397906-0
                                                        • Opcode ID: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                                        • Instruction ID: 02545dd0d615a745195cb6f618e51c1f9c2552a202a2369b8695847d2ce6fb2f
                                                        • Opcode Fuzzy Hash: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                                        • Instruction Fuzzy Hash: 24117EB9608302AFC304DF18D98095BBBE9FFD8650F10891EF88993350D770E9498BA2
                                                        APIs
                                                        • __wsplitpath.LIBCMT ref: 00436A45
                                                          • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                        • __wsplitpath.LIBCMT ref: 00436A6C
                                                        • __wcsicoll.LIBCMT ref: 00436A93
                                                        • __wcsicoll.LIBCMT ref: 00436AB0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                        • String ID:
                                                        • API String ID: 1187119602-0
                                                        • Opcode ID: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                                        • Instruction ID: cc447ddabc085245cf6c6bda96777749177fc915bba42f20b5b260b799017f3a
                                                        • Opcode Fuzzy Hash: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                                        • Instruction Fuzzy Hash: 690165B64043416BD724EB50D881EEBB3ED7BD8304F04C91EB5C982041FB38D24C87A6
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                        • String ID:
                                                        • API String ID: 1597257046-0
                                                        • Opcode ID: ef4c8eb1668fb764ac9879486c39433899b48e1b70f0ed706df85b8b39ec7f0c
                                                        • Instruction ID: 9df5ee2dcc5f1a759a9cde70f7b42babd8a8bdcc369222b22224423102f690bd
                                                        • Opcode Fuzzy Hash: ef4c8eb1668fb764ac9879486c39433899b48e1b70f0ed706df85b8b39ec7f0c
                                                        • Instruction Fuzzy Hash: BFF06D32200200AFC314EB66C885E6BB3EAEBC5324F04852EF556C7791DB39F841C764
                                                        APIs
                                                        • DeleteObject.GDI32(?), ref: 0045564E
                                                        • DeleteObject.GDI32(?), ref: 0045565C
                                                        • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                        • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: DeleteDestroyObject$IconWindow
                                                        • String ID:
                                                        • API String ID: 3349847261-0
                                                        • Opcode ID: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                                        • Instruction ID: 3a9029eb8e47786e7dec82746d504bb216afab776d143f23dce7b1a7602128e4
                                                        • Opcode Fuzzy Hash: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                                        • Instruction Fuzzy Hash: 06F03C702006419BDB20AF65DDD8A2B77ACEF45322740456AFD04D7242DB28DC498B7D
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B60B
                                                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B619
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B630
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B641
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                        • String ID:
                                                        • API String ID: 2223660684-0
                                                        • Opcode ID: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                                        • Instruction ID: 8f2921e390180aa9c6083979f061463a0462abb68b72a76a452ff5fd2bc04521
                                                        • Opcode Fuzzy Hash: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                                        • Instruction Fuzzy Hash: 35F08C362422019F82249B59EA488DBB3FDEBE97213009C2FE142C32108BB5F806CB75
                                                        APIs
                                                          • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                          • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                          • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                          • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                        • MoveToEx.GDI32(?,?,00000000,00000000), ref: 0044728F
                                                        • LineTo.GDI32(?,00000000,00000002), ref: 004472A0
                                                        • EndPath.GDI32(?), ref: 004472B0
                                                        • StrokePath.GDI32(?), ref: 004472BE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                        • String ID:
                                                        • API String ID: 2783949968-0
                                                        • Opcode ID: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                                        • Instruction ID: 15f667079dd022c0076d5117e5ffb33549464faf874781034dcdd6a9c0a79bb3
                                                        • Opcode Fuzzy Hash: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                                        • Instruction Fuzzy Hash: 46F09030109361BFE211DB10DC0AF9F3B98AB46310F10490CF641622D2C7B46845C7BA
                                                        APIs
                                                        • __getptd.LIBCMT ref: 00417D1A
                                                          • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                                          • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                                        • __getptd.LIBCMT ref: 00417D31
                                                        • __amsg_exit.LIBCMT ref: 00417D3F
                                                        • __lock.LIBCMT ref: 00417D4F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                        • String ID:
                                                        • API String ID: 3521780317-0
                                                        • Opcode ID: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                                        • Instruction ID: 784cd6646040312d8c3929352b57c791f513dbd9ce30c249d09a92555f0e5bc7
                                                        • Opcode Fuzzy Hash: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                                        • Instruction Fuzzy Hash: D4F06D319447089AD720FB66E4067EA32B0AF01728F11856FA4415B7D2DB3C99C08B9E
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 00471144
                                                        • GetDC.USER32(00000000), ref: 0047114D
                                                        • GetDeviceCaps.GDI32(00000000,00000074), ref: 0047115A
                                                        • ReleaseDC.USER32(00000000,?), ref: 0047117B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                                        • Instruction ID: a1da8b046b56c0024f4e51319ca7c868ce9b42ab557c4db2e47d6af70bf9fcef
                                                        • Opcode Fuzzy Hash: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                                        • Instruction Fuzzy Hash: 75F05E759042009FC310DF65DC4856EBBA4FB94351F108C3EFD05D2251DB7889059B99
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 00471102
                                                        • GetDC.USER32(00000000), ref: 0047110B
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00471118
                                                        • ReleaseDC.USER32(00000000,?), ref: 00471139
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                                        • Instruction ID: 5204c471e266b2ed5cdb435334cd6f206910ee07043e0bb223494c3f632f6575
                                                        • Opcode Fuzzy Hash: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                                        • Instruction Fuzzy Hash: 78F05E759042009FD310EF65DC5896EBBA4FB94351F104C3EFC05D2251DB7489059B99
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                                        • GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                                        • GetCurrentThreadId.KERNEL32 ref: 004389DA
                                                        • AttachThreadInput.USER32(00000000), ref: 004389E1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 2710830443-0
                                                        • Opcode ID: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                                        • Instruction ID: 438da6915ae72ab6a15f098678a9856147cbf2dc0a85cf0a700465948addd5b0
                                                        • Opcode Fuzzy Hash: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                                        • Instruction Fuzzy Hash: 14E012712853107BE72157509D0EFAF7B98AF18B11F14481EB241B50D0DAF8A941876E
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004390CD
                                                        • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 004390DB
                                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390EB
                                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390F0
                                                          • Part of subcall function 00438FB6: GetProcessHeap.KERNEL32(00000000,?,00439504,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FC1
                                                          • Part of subcall function 00438FB6: HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00438FC8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                                        • Instruction ID: e19b07cb6d87eea3d85dfea562759309df1919ba68b29a0146d7a5ec0ea3c710
                                                        • Opcode Fuzzy Hash: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                                        • Instruction Fuzzy Hash: 5DE0C976504311ABC620EB65DC48C4BB7E9EF883303114E1DF89693260CA74E881CB65
                                                        APIs
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00414070
                                                          • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                                        • __getptd_noexit.LIBCMT ref: 00414080
                                                        • __freeptd.LIBCMT ref: 0041408A
                                                        • ExitThread.KERNEL32 ref: 00414093
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 3182216644-0
                                                        • Opcode ID: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                                        • Instruction ID: 8c1b811a677bc0208766d104aadce1409d27245c16b3af4a320e27a455eae914
                                                        • Opcode Fuzzy Hash: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                                        • Instruction Fuzzy Hash: F8D0EC7051024256D6207BA7ED097AA3A589B44B26B15446EA905801B1DF68D9C1862D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: BuffCharLower
                                                        • String ID: $8'I
                                                        • API String ID: 2358735015-3608026889
                                                        • Opcode ID: e3039598ad07eb1683e22d1e13845cc1c6bfaba1fe80df618d976ecbdfba683b
                                                        • Instruction ID: 1bf34105e022c250dd7240f1ea7ec4803edb57b208c13e69c3fb06210d7c4844
                                                        • Opcode Fuzzy Hash: e3039598ad07eb1683e22d1e13845cc1c6bfaba1fe80df618d976ecbdfba683b
                                                        • Instruction Fuzzy Hash: 9FE1AE745043018BCB24EF16D88166BB7E4BF94348F40482FF88597292EB79DD89CB9B
                                                        APIs
                                                        • OleSetContainedObject.OLE32(00000000,00000001), ref: 0047857A
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 00445513: OleSetContainedObject.OLE32(?,00000000), ref: 00445593
                                                          • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                          • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: CopyVariant$ContainedObject$ErrorLast_malloc
                                                        • String ID: AutoIt3GUI$Container
                                                        • API String ID: 3380330463-3941886329
                                                        • Opcode ID: a9ff7069b9b8d6ccd49eba872ad7efd2467de888f1098c4430e935d21ee713db
                                                        • Instruction ID: 8a51a4197b359b89da059ec4b883cd23719ad159cb4f439b8c2c8f5fea4c1b32
                                                        • Opcode Fuzzy Hash: a9ff7069b9b8d6ccd49eba872ad7efd2467de888f1098c4430e935d21ee713db
                                                        • Instruction Fuzzy Hash: FEA16A71240601AFC760EF69C880A6BB7E9FB88304F10892EF649CB361EB75E945CB55
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00409A61
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                          • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                          • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                          • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                        • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                        • String ID: 0vH
                                                        • API String ID: 1143807570-3662162768
                                                        • Opcode ID: 06636c051a656e0db8e48e9a81f0f7daa77b956eb8708b24b717754a54bb628e
                                                        • Instruction ID: 5e67718e4417cbef977f4cc7974cb0b4b39b480e5382bb1977b3cac956c07efc
                                                        • Opcode Fuzzy Hash: 06636c051a656e0db8e48e9a81f0f7daa77b956eb8708b24b717754a54bb628e
                                                        • Instruction Fuzzy Hash: 53515BB1A083009FC718CF18C48065BB7E1FF88314F54856EF9999B391D779E942CB96
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: HH$HH
                                                        • API String ID: 0-1787419579
                                                        • Opcode ID: 7546cf6663fec2d41e0be28018c51c43d88dc93244b488606bcda1ed75612bc1
                                                        • Instruction ID: b2aab3850ea6996be17d3b26b1a0d96f4757dd5de2ef7d298d9c2790e2b3b10f
                                                        • Opcode Fuzzy Hash: 7546cf6663fec2d41e0be28018c51c43d88dc93244b488606bcda1ed75612bc1
                                                        • Instruction Fuzzy Hash: 1241BF367042009FC310EF69E881F5AF3A1EF99314F548A6EFA589B381D776E811CB95
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: 38f09aa922346eb88559bb972c0ed36bedb4057ad35cf6b519ccfeef0a85981d
                                                        • Instruction ID: 143d79469fb3e570aa9bb1e7a79db7ad77638f8ab3c2e89d41e08a42c99b444e
                                                        • Opcode Fuzzy Hash: 38f09aa922346eb88559bb972c0ed36bedb4057ad35cf6b519ccfeef0a85981d
                                                        • Instruction Fuzzy Hash: CB3101721043009BF3249F18DC85BABBBE4EBC6310F14081FFA90C62A0E379D949C75A
                                                        APIs
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0044846C
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044847E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                                        • Instruction ID: cecdca06d5aa7ecc7109d5e1ff25192cbd540bafe2d1ef24ff7c1b98f096cb5f
                                                        • Opcode Fuzzy Hash: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                                        • Instruction Fuzzy Hash: 984179706083459FE710CF18C880BABB7E1FB89700F54882EF9888B351DB75A841CF5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                                        • Instruction ID: 268d240ecd79f719a1425e83c09d650ed443e1bf0ac8ef4f8d51517adc50c1d2
                                                        • Opcode Fuzzy Hash: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                                        • Instruction Fuzzy Hash: B6210D765042206BEB15DF08D844B97B7A4FBDA310F44492BEE9897250D379E848C7AA
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00451305
                                                        • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00451313
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                                        • Instruction ID: f266216a818347eeb58d59163185d0479ace604409515c443b0f4894c7ad90f2
                                                        • Opcode Fuzzy Hash: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                                        • Instruction Fuzzy Hash: D9110A72A0430067E6109AA4DC80F5BB3D8EB99735F10071BFA24E72E1D774FC448768
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 004515DA
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004515EA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                                        • Instruction ID: b80de1f22085cd2d24dcce0fe83431d10f7d2aff66e66183492c5b70af3c9e13
                                                        • Opcode Fuzzy Hash: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                                        • Instruction Fuzzy Hash: 2011E4716003006BD6109A64D884F6BB3DCEBD8335F104B1EFA61D32E1D779EC458729
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 00474833
                                                        • GlobalMemoryStatusEx.KERNEL32 ref: 00474846
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                                        • Instruction ID: 41c327e25453105c4ca6c880754d33c67e761007402a238c65fd2e715fefe222
                                                        • Opcode Fuzzy Hash: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                                        • Instruction Fuzzy Hash: 4421C230929A14B7C2107F6ABD4BB5E7BB8AF44716F008C5DF5C562094DF785268836F
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: htonsinet_addr
                                                        • String ID: 255.255.255.255
                                                        • API String ID: 3832099526-2422070025
                                                        • Opcode ID: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                                        • Instruction ID: e3b5e028fda38c0aed97ec3d425ece65e45bc088e5f3683a6f0e3ee8de0e9224
                                                        • Opcode Fuzzy Hash: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                                        • Instruction Fuzzy Hash: 6F11253620030057DA10EB69C882F9BB394EFC4728F00896BFA105B283D679F45A832E
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469547
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 455545452-1403004172
                                                        • Opcode ID: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                                        • Instruction ID: d7878a024921556205560296ec06e6abf53b779169672b4943ab7ad66f70e2c7
                                                        • Opcode Fuzzy Hash: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                                        • Instruction Fuzzy Hash: 2601D6327011106B8600BB299C019AFB39DDBC2370F544A2FF965573D1EA39AC0E476A
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00442B8C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: InternetOpen
                                                        • String ID: <local>
                                                        • API String ID: 2038078732-4266983199
                                                        • Opcode ID: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                                        • Instruction ID: 525aca290fb55aeb65c4bf55ca0deee88c9418ef2a1db54778758d1eb2e06c8a
                                                        • Opcode Fuzzy Hash: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                                        • Instruction Fuzzy Hash: 9011A934144751AAF621DF108D86FB77794FB50B01F50480FF9866B2C0D6F4B848C766
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(00000000,00000180,00000000,00000000), ref: 00469660
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 455545452-1403004172
                                                        • Opcode ID: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                                        • Instruction ID: 486d2595d5a7427da4a9c048e684990a8dc9cac685a8154682435d05c4426571
                                                        • Opcode Fuzzy Hash: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                                        • Instruction Fuzzy Hash: A101D87274121027C600BA259C01AEBB39CEB96354F04443BF94597291EA6DED0E43AA
                                                        APIs
                                                          • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                        • SendMessageW.USER32(00000182,00000182,?,00000000), ref: 004695D6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 455545452-1403004172
                                                        • Opcode ID: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                                        • Instruction ID: 72d13aeac174e9c1a3a177398698555a642000804846b33da1492f44d6438514
                                                        • Opcode Fuzzy Hash: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                                        • Instruction Fuzzy Hash: 4D01A77374111067C610BA6A9C01AEB739CABD2364F44443BF94597292EA7DED0E43AA
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _strncmp
                                                        • String ID: ,$UTF8)
                                                        • API String ID: 909875538-2632631837
                                                        • Opcode ID: 727c7c5760fb27673dbb24875b26f121239a8201232c39922ad2fa80f7f85d54
                                                        • Instruction ID: 35c0b5e4e6bd282640ba12729024cfd3588da47ca1ed1c49f01331a057b7ec9b
                                                        • Opcode Fuzzy Hash: 727c7c5760fb27673dbb24875b26f121239a8201232c39922ad2fa80f7f85d54
                                                        • Instruction Fuzzy Hash: 7601B575A083805BE720DE20CC85BA773A1AB81319F58492ED8D5872A1F73DD449C75B
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: _strncmp
                                                        • String ID: ,$UTF8)
                                                        • API String ID: 909875538-2632631837
                                                        • Opcode ID: abd9c85c193eb76a615b38e8260140970f327620044c052ec7ea970ca86f7e2a
                                                        • Instruction ID: b3c6803870d1b21283bf32431af321d4190ac902c568a1d8b2e557ddf245ca97
                                                        • Opcode Fuzzy Hash: abd9c85c193eb76a615b38e8260140970f327620044c052ec7ea970ca86f7e2a
                                                        • Instruction Fuzzy Hash: 1E01D875A043805BE720DE20CC85B6773A19B4131AF68492FD8D6872A1F73DD449C75B
                                                        APIs
                                                        • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560BA
                                                          • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                        • wsprintfW.USER32 ref: 004560E9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_mallocwsprintf
                                                        • String ID: %d/%02d/%02d
                                                        • API String ID: 1262938277-328681919
                                                        • Opcode ID: dc5fd9a877cd0fc352ed6de9b5f97ee6fb2dcbb154e3a48ad4a1e49fbb654ae8
                                                        • Instruction ID: 2a73c44ac592e0fe880a68d863bd42ca8887a008949f121bccc13d44bcf2ebb3
                                                        • Opcode Fuzzy Hash: dc5fd9a877cd0fc352ed6de9b5f97ee6fb2dcbb154e3a48ad4a1e49fbb654ae8
                                                        • Instruction Fuzzy Hash: 13F08272744220A7E2105BA5AC01BBFB3D4EB84762F10443BFE44D12C0E66E8455D7BA
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0044226C
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0044227F
                                                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                                        • Instruction ID: f0ed9326d30a696a9ade51716a531e8bd1705000bbe21894ac7a57cb5589152b
                                                        • Opcode Fuzzy Hash: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                                        • Instruction Fuzzy Hash: 71D0A772F8130177E92077706D0FFCB26246F14710F010C3AB305AA1C0D4E8D440C358
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00442240
                                                        • PostMessageW.USER32(00000000), ref: 00442247
                                                          • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                                        • Instruction ID: d1e5b9be119239975405e397b0c0efdc35250005003305bf123d4268f2ecb06f
                                                        • Opcode Fuzzy Hash: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                                        • Instruction Fuzzy Hash: 4DD05E72B813013BE92076706D0FF8B26246B14710F010C2AB205AA1C0D4E8A4408358
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00439522
                                                          • Part of subcall function 00411A1F: _doexit.LIBCMT ref: 00411A2B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1423327923.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.1423306350.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423423022.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423444349.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1423478759.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_0wxckB4Iba.jbxd
                                                        Similarity
                                                        • API ID: Message_doexit
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 1993061046-4017498283
                                                        • Opcode ID: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                                        • Instruction ID: 5d68346425d2699d55792fe39b85c2381918ba1f955abba655776c5540820644
                                                        • Opcode Fuzzy Hash: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                                        • Instruction Fuzzy Hash: 82B092343C038627E20437A01C0BF8C28049B64F42F220C2AB308384D259D90080231E